In this section, we describe several protocols currently in use or under
development. All of these provide the properties that are required for secure messages;
none of them, however, provide the relational properties that are required for
secure transactions.