Login / Signup
Deciding Key Cycles for Security Protocols.
Véronique Cortier
Eugen Zalinescu
Published in:
LPAR (2006)
Keyphrases
</>
security protocols
secure communication
automated design
security properties
artificial immune algorithm
security requirements
security services
cryptographic algorithms
database systems
key management
cryptographic protocols