Login / Signup
Optimization of TLS security protocol using the adaptable security model.
Pawel Szalachowski
Bogdan Ksiezopolski
Zbigniew Kotulski
Published in:
Ann. UMCS Informatica (2009)
Keyphrases
</>
security model
security protocols
security requirements
security analysis
public key
access control
authentication protocol
artificial immune algorithm
security mechanisms
security services
peer to peer
smart card
provably secure
information systems