Login / Signup
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
Xudong He
Jiabing Liu
Chin-Tser Huang
Dejun Wang
Bo Meng
Published in:
IEEE Access (2019)
Keyphrases
</>
security protocols
artificial immune algorithm
security properties
authentication protocol
security analysis
security services
security requirements
rfid systems
security mechanisms
smart card
key management
data mining
information systems
data sources