Keyphrases
- security protocols
- security properties
- key management
- key distribution
- automated design
- digital images
- wireless sensor networks
- security services
- cryptographic algorithms
- ad hoc networks
- resource constrained
- authentication protocol
- artificial immune algorithm
- secure communication
- digital signature
- cryptographic protocols
- security requirements
- elliptic curve
- security mechanisms
- resource constraints
- operating system
- databases