Login / Signup

A formalism for visual security protocol modeling.

J. McDermottGerard Allwein
Published in: J. Vis. Lang. Comput. (2008)
Keyphrases
  • security protocols
  • visual information
  • databases
  • information systems
  • end users
  • cloud computing
  • formal model
  • authentication protocol
  • artificial immune algorithm