Security Protocols for Secret Santa.
Sjouke MauwSasa RadomirovicPeter Y. A. RyanPublished in: Security Protocols Workshop (2010)
Keyphrases
- security protocols
- key management
- secret sharing scheme
- automated design
- security services
- cryptographic algorithms
- secret key
- security properties
- artificial immune algorithm
- secure communication
- secret sharing
- security mechanisms
- cryptographic protocols
- authentication protocol
- resource constrained
- rfid tags
- real time
- design process
- information systems