Login / Signup
Term-based composition of security protocols
Béla Genge
Piroska Haller
Ovidiu Ratoi
Iosif Ignat
Published in:
CoRR (2009)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
key management
cryptographic protocols
security properties
artificial immune algorithm
secure communication
security mechanisms
authentication protocol
real time