Login / Signup
Implementing Security Protocol Monitors.
Yannick Chevalier
Michaël Rusinowitch
Published in:
SCSS (2021)
Keyphrases
</>
security protocols
security services
automated design
artificial immune algorithm
security mechanisms
cryptographic algorithms
databases
key management
authentication protocol
database systems
rfid tags
resource constrained