Keyphrases
- security protocols
- security mechanisms
- automated design
- security properties
- security services
- cryptographic algorithms
- resource constrained
- computer networks
- access control
- security requirements
- key management
- authentication protocol
- secure communication
- distributed computing
- smart card
- similarity search
- information systems
- real time