Skip to main content
. 2024 May 13;24(10):3085. doi: 10.3390/s24103085

Table 6.

ProVerif code for queries.

(*—-queries—-*)
query IDj:bitstring; inj-event(endfstS(IDj)) ==> inj-event(startfstS(IDj)).
query IDj:bitstring; inj-event(end2ndS(IDj)) ==> inj-event(start2ndS(IDj)).
query IDj:bitstring; inj-event(endfstN(IDj)) ==> inj-event(startfstN(IDj)).
query IDj:bitstring; inj-event(end2ndN(IDj)) ==> inj-event(start2ndN(IDj)).
query attacker(K).
(*—-process—-*)
process
((!SMj)|(!NG))