Login / Signup
Modeling and analyzing security protocols in SAM: A case study.
Zhengfan Dai
Xudong He
Junhua Ding
Shu Gao
Published in:
IASTED Conf. on Software Engineering and Applications (2004)
Keyphrases
</>
security protocols
security properties
automated design
case study
database systems
artificial immune algorithm