Login / Signup
Sound Security Protocol Transformations.
Thanh Binh Nguyen
Christoph Sprenger
Published in:
POST (2013)
Keyphrases
</>
security protocols
artificial immune algorithm
automated design
security services
cryptographic algorithms
security mechanisms
key management
authentication protocol
rfid tags
information systems
data streams
low cost
data processing
security measures