0% found this document useful (0 votes)
18 views2 pages

Use Case Diagram: Sender

A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.

Uploaded by

Swetha Pattipaka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

Use Case Diagram: Sender

A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.

Uploaded by

Swetha Pattipaka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Use Case Diagram

sender

Hash Key Generation

EPS-AKA

Receiver

Class Diagram

EPS-AKA

Sender
+Request

+Randomnumber

+Upload()

+Session Key()

Receiver
+Request
+Download()

Hash Key Generation


+Setup
+KeyDistribution()

You might also like