Login / Signup
Performance Evaluation of Security Protocols
Béla Genge
Piroska Haller
Published in:
CoRR (2009)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
security properties
artificial immune algorithm
security mechanisms
authentication protocol
key management
security requirements
secure communication
cryptographic protocols
real time
databases
artificial intelligence
information systems