thanks, but in this there are no keys, key encryption keys, counters, deriavtion functions, or anything that would indicate how the security of identities and messages are preserved.
sure, sequence diagrams, which are great to have and necessary, but there are no assertions about how security is done.