Login / Signup
Fast automatic security protocol generation.
Hongbin Zhou
Simon N. Foley
Published in:
J. Comput. Secur. (2012)
Keyphrases
</>
security protocols
artificial immune algorithm
real time
data mining
security services
automated design
information systems
digital libraries
third party
key management
authentication protocol