Login / Signup
A Diagram of Strand Spaces for Security Protocols.
Huanbao Wang
Yousheng Zhang
Yuan Li
Published in:
J. Comput. Res. Dev. (2006)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
security mechanisms
key management
secure communication
artificial immune algorithm
authentication protocol
artificial intelligence
wireless sensor networks
response time
cost effective
rfid tags