[Impressum] [E-Mail]

Modeling Copy Card with HashValues (2)

The next step is to describe the data types and messages with UML class diagrams and the communication structure and attacker capabilities with an UML deployment diagram.
        Class Diagram

Class Diagram Usermessages
        Deployment Diagram


Back, Next Step: Detailed model with activity diagrams