Login / Signup
Refining security protocols.
Christoph Sprenger
David A. Basin
Published in:
J. Comput. Secur. (2018)
Keyphrases
</>
security protocols
automated design
security properties
security services
key management
authentication protocol
cryptographic algorithms
security mechanisms
artificial immune algorithm
secure communication
security requirements
rfid tags
artificial intelligence
computer systems
resource constrained