Login / Signup
Validating security protocols with cloud-based middleboxes.
Curtis R. Taylor
Craig A. Shue
Published in:
CNS (2016)
Keyphrases
</>
security protocols
automated design
cloud computing
cryptographic algorithms
security services
security properties
artificial immune algorithm
key management
authentication protocol
security mechanisms
rfid tags
secure communication
database
security requirements
real time
computer networks
digital libraries