Keyphrases
- security protocols
- cryptographic protocols
- automated design
- security properties
- cryptographic algorithms
- key management
- artificial immune algorithm
- model checking
- security services
- secure communication
- authentication protocol
- resource constrained
- formal verification
- high security
- security requirements
- databases
- rfid tags
- engineering design
- ad hoc networks
- sensor data
- artificial intelligence