Login / Signup
Modelling the relative strength of security protocols.
Ho Chung
Clifford Neuman
Published in:
QoP (2006)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
key management
security services
artificial immune algorithm
rfid tags
authentication protocol
cryptographic protocols
secure communication
artificial intelligence
security mechanisms
information systems
secret key