Sign in
Heuristic Methods for Security Protocols
Qurat ul Ain Nizamani
Emilio Tuosto
Published in:
SECCO (2009)
Keyphrases
</>
heuristic methods
security protocols
cryptographic algorithms
optimal solution
automated design
tabu search
security services
key management
security properties
artificial immune algorithm
security mechanisms
authentication protocol
cryptographic protocols
secure communication
information systems