Login / Signup
Supporting security protocols on CAN-based networks.
Gedare Bloom
Gianluca Cena
Ivan Cibrario Bertolotti
Tingting Hu
Adriano Valenzano
Published in:
ICIT (2017)
Keyphrases
</>
security protocols
automated design
security properties
security services
cryptographic algorithms
artificial immune algorithm
social networks
authentication protocol
database systems
key management
secure communication
computer networks
security mechanisms
cryptographic protocols