Login / Signup
Towards Validating Security Protocol Deployment in the Wild.
Luca Compagna
Ulrich Flegel
Volkmar Lotz
Published in:
COMPSAC (2) (2009)
Keyphrases
</>
security protocols
automated design
artificial immune algorithm
cryptographic algorithms
security services
key management
authentication protocol
security requirements
rfid tags
security mechanisms
real time
metadata
data mining
database systems
resource constrained