Login / Signup
Is Your Security Protocol on Time ?
Gizela Jakubowska
Wojciech Penczek
Published in:
FSEN (2007)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
security mechanisms
key management
authentication protocol
security requirements
real time
rfid tags
data mining
search engine
wireless sensor networks
software engineering
security issues