Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion).
Luca ViganòPublished in: Security Protocols Workshop (2014)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security services
- artificial immune algorithm
- key management
- security properties
- authentication protocol
- collaborative learning
- secure communication
- group discussion
- security mechanisms
- real time
- security requirements
- data mining
- rfid tags
- access control
- software engineering