Submissions: Difference between revisions

9 bytes added ,  12 July 2019
Line 41: Line 41:
# Mathematical equations or inequalities for security claims and other items mentioned above can be accommodated here.
# Mathematical equations or inequalities for security claims and other items mentioned above can be accommodated here.
#If using a new term for any of the above, please explain it here itself and if needed, provide a link to the supplementary information page for a detailed explanation. E.g. Any property not defined in the functionality description already could be defined here.
#If using a new term for any of the above, please explain it here itself and if needed, provide a link to the supplementary information page for a detailed explanation. E.g. Any property not defined in the functionality description already could be defined here.
*'''Pseudo Code''' This section contains an algorithm/ pseudo code of the protocol.
*'''Protocol Description''' This section contains an algorithm/ pseudo code of the protocol.
**Should be a step-wise description of the protocol with mathematical equations. Avoid words as much as possible.
**Should be a step-wise description of the protocol with mathematical equations. Avoid words as much as possible.
** Can be divided into stages common for all the protocols in the concerned functionality. For example, Delegated Computing
** Can be divided into stages common for all the protocols in the concerned functionality. For example, Delegated Computing
Write, autoreview, editor, reviewer
3,129

edits