Write, autoreview, editor, reviewer
3,129
edits
Line 41: | Line 41: | ||
# Mathematical equations or inequalities for security claims and other items mentioned above can be accommodated here. | # Mathematical equations or inequalities for security claims and other items mentioned above can be accommodated here. | ||
#If using a new term for any of the above, please explain it here itself and if needed, provide a link to the supplementary information page for a detailed explanation. E.g. Any property not defined in the functionality description already could be defined here. | #If using a new term for any of the above, please explain it here itself and if needed, provide a link to the supplementary information page for a detailed explanation. E.g. Any property not defined in the functionality description already could be defined here. | ||
*''' | *'''Protocol Description''' This section contains an algorithm/ pseudo code of the protocol. | ||
**Should be a step-wise description of the protocol with mathematical equations. Avoid words as much as possible. | **Should be a step-wise description of the protocol with mathematical equations. Avoid words as much as possible. | ||
** Can be divided into stages common for all the protocols in the concerned functionality. For example, Delegated Computing | ** Can be divided into stages common for all the protocols in the concerned functionality. For example, Delegated Computing |