A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.
A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.
A use case diagram shows a sender generating a hash key with EPS-AKA and sending it to a receiver. A class diagram then models the interactions between the sender, receiver, and hash key generation classes. The sender requests a random number from EPS-AKA and uploads a session key. The receiver requests the key and downloads it. Hash key generation sets up the system and distributes keys.