Login / Signup
Gaining Flexibility by Security Protocol Transfer.
Per Harald Myrvang
Tage Stabell-Kulø
Published in:
ISCC (2007)
Keyphrases
</>
security protocols
cryptographic algorithms
artificial immune algorithm
security services
automated design
authentication protocol
key management
databases
rfid tags
security mechanisms
access control
end to end
resource constrained