Keyphrases
- invited talk
- security protocols
- cryptographic protocols
- automated design
- selected papers
- authentication protocol
- security properties
- knowledge discovery and data mining
- security services
- model checking
- key management
- artificial immune algorithm
- security mechanisms
- rfid tags
- databases
- australasian database conference