Login / Signup
Bundle Security Protocol Specification.
Susan Flynn Symington
Stephen Farrell
Howard S. Weiss
Peter Lovell
Published in:
RFC (2011)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
artificial immune algorithm
key management
security services
security mechanisms
authentication protocol
data mining
database systems
similarity search
rfid tags
security requirements