Login / Signup
An Approach to Analyzing Availability Properties of Security Protocols.
Henrik Pilegaard
Michael R. Hansen
Robin Sharp
Published in:
Nord. J. Comput. (2003)
Keyphrases
</>
security protocols
security properties
automated design
database
security services
artificial immune algorithm
real time
secure communication
authentication protocol