Keyphrases
- security protocols
- automated design
- security services
- security properties
- artificial immune algorithm
- authentication protocol
- cryptographic algorithms
- security mechanisms
- cryptographic protocols
- key management
- real time
- security requirements
- secure communication
- distributed systems
- case study
- information systems
- data mining