Keyphrases
- security protocols
- security properties
- key management
- key distribution
- automated design
- cryptographic algorithms
- security services
- wireless sensor networks
- ad hoc networks
- security mechanisms
- digital signature
- secure communication
- artificial immune algorithm
- resource constrained
- rfid tags
- cryptographic protocols
- authentication protocol
- security analysis
- security requirements
- databases
- elliptic curve
- real time
- secret key
- digital libraries
- information systems
- data mining