Login / Signup
Close to Optimally Secure Variants of GCM.
Ping Zhang
Honggang Hu
Qian Yuan
Published in:
Secur. Commun. Networks (2018)
Keyphrases
</>
security requirements
authentication scheme
real time
data sets
machine learning
artificial intelligence
multiscale
security protocols
user authentication
e learning
evolutionary algorithm
low cost
lightweight
security analysis
standard model
authentication protocol