Login / Signup

Extending Security Protocol Analysis: New Challenges.

Mike BondJolyon Clulow
Published in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
  • security protocols
  • real time
  • artificial immune algorithm
  • end users
  • low cost
  • data processing
  • personal information
  • authentication protocol
  • security services