Login / Signup
Time Influence on Security Protocol.
Sabina Szymoniak
Published in:
ENASE (2021)
Keyphrases
</>
security protocols
cryptographic algorithms
artificial immune algorithm
automated design
security services
security mechanisms
security requirements
authentication protocol
key management
information systems
database systems
data processing
smart card
resource constrained