Login / Signup

Verifying security protocols by knowledge analysis.

Xiaoqi MaXiaochun Cheng
Published in: Int. J. Secur. Networks (2008)
Keyphrases
  • security protocols
  • real time
  • artificial intelligence
  • data analysis
  • knowledge discovery
  • case study