A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
18 views2 pages
Use Case Diagram: Sender
A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.