Supplementary material for Chapter 11

Security

Program code:

Figures 7.8-7.10 TEA algorithm

Supplementary material from Edition 2:

BAN logic

Supplementary material from Edition 3:

Low-value electronic transactions: the Millicent protocol