Login / Signup
On Evaluating the Performance of Security Protocols.
Chiara Bodei
Mikael Buchholtz
Michele Curti
Pierpaolo Degano
Flemming Nielson
Hanne Riis Nielson
Corrado Priami
Published in:
PaCT (2005)
Keyphrases
</>
security protocols
automated design
security services
security properties
cryptographic algorithms
artificial immune algorithm
secure communication
authentication protocol
security mechanisms
key management
cryptographic protocols
case study