Login / Signup

An Approach to Automated Design of Security Protocols.

Pavel OcenasekMiroslav Svéda
Published in: ICN/ICONS/MCL (2006)
Keyphrases
  • automated design
  • security protocols
  • security properties
  • security mechanisms
  • artificial immune algorithm
  • key management
  • wireless sensor networks
  • cloud computing
  • engineering design
  • rfid tags
  • evolutionary design