Rule-based Programs Describing Internet Security Protocols.
Yannick ChevalierLaurent VigneronPublished in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
- security protocols
- security mechanisms
- automated design
- expert systems
- security services
- cryptographic algorithms
- resource constrained
- security properties
- key management
- artificial immune algorithm
- secure communication
- authentication protocol
- security issues
- access control
- cryptographic protocols
- real time
- database systems
- information systems
- artificial intelligence