Login / Signup
A New Evaluation Model for Security Protocols.
Chao Yang
Jianfeng Ma
Xuewen Dong
Published in:
J. Commun. (2011)
Keyphrases
</>
evaluation model
security protocols
evaluation method
automated design
key management
security properties
artificial immune network
fuzzy theory
bp neural network
security mechanisms
artificial immune algorithm
analytic hierarchy process
fuzzy comprehensive evaluation
operating system
rfid tags