Fig. 4From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecturePart HLPSL simulation code of our protocol. Figure includes two pictures. The b presents the HLPSL description of user roles. The role environment and the security goals in HLPSL code are showing in bBack to article page