Login / Signup
Extending Security Protocol Analysis: New Challenges.
Mike Bond
Jolyon Clulow
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
real time
artificial immune algorithm
end users
low cost
data processing
personal information
authentication protocol
security services