1.5 Prerequisites/Preconditions

This protocol assumes that authentication has been performed by the underlying protocols.

Show: