Keyphrases
- security protocols
- automated design
- security services
- automated theorem provers
- cryptographic algorithms
- authentication protocol
- artificial immune algorithm
- security properties
- secure communication
- security mechanisms
- key management
- evolutionary design
- case study
- data mining
- databases
- mechanism design
- security requirements
- operating system
- response time
- real time