Login / Signup
A formalism for visual security protocol modeling.
J. McDermott
Gerard Allwein
Published in:
J. Vis. Lang. Comput. (2008)
Keyphrases
</>
security protocols
visual information
databases
information systems
end users
cloud computing
formal model
authentication protocol
artificial immune algorithm