Login / Signup

Fast automatic security protocol generation.

Hongbin ZhouSimon N. Foley
Published in: J. Comput. Secur. (2012)
Keyphrases
  • security protocols
  • artificial immune algorithm
  • real time
  • data mining
  • security services
  • automated design
  • information systems
  • digital libraries
  • third party
  • key management
  • authentication protocol