Keyphrases
- plan recognition
- ai planning
- security issues
- plan generation
- lightweight
- security requirements
- real time
- security protocols
- sensor networks
- security analysis
- case study
- authentication protocol
- key distribution
- database
- security level
- security properties
- case based planning
- diffie hellman
- key exchange
- data encryption
- key exchange protocol