Login / Signup
Security Protocol Deployment Risk.
Simon N. Foley
Giampaolo Bella
Stefano Bistarelli
Published in:
Security Protocols Workshop (2008)
Keyphrases
</>
security protocols
cryptographic algorithms
artificial immune algorithm
security services
automated design
risk management
key management
security mechanisms
authentication protocol
cost effective
risk assessment
security requirements
rfid tags