Using evolutionary techniques to analyze the security of quantum key distribution protocols.
Walter O. KrawecPublished in: GECCO (Companion) (2014)
Keyphrases
- key distribution
- key management
- authentication protocol
- fault tolerant
- group communication
- secret key
- security protocols
- private key
- key agreement protocol
- key exchange
- elliptic curve
- signcryption scheme
- diffie hellman
- signature scheme
- ad hoc networks
- wireless ad hoc networks
- resource constrained
- smart card
- key agreement
- key establishment protocol
- key management scheme
- real time
- security services
- wireless sensor networks
- similarity measure
- secure communication
- trusted third party
- fault tolerance
- intrusion detection
- distributed systems
- session key
- key establishment