Login / Signup
Automated Design of Security Protocols.
Hao Chen
John A. Clark
Jeremy L. Jacob
Published in:
Comput. Intell. (2004)
Keyphrases
</>
automated design
security protocols
artificial immune algorithm
security properties
key management
evolutionary design
engineering design
rfid tags
security mechanisms
multi agent
computational intelligence
intrusion detection