Login / Signup

Modeling Security Protocols as Games.

Mohamed SalehMourad Debbabi
Published in: IAS (2007)
Keyphrases
  • security protocols
  • automated design
  • video games
  • key management
  • cryptographic algorithms
  • data mining
  • data processing
  • game theory
  • ad hoc networks
  • security requirements
  • security services
  • secure communication