Keyphrases
- security protocols
- automated design
- security services
- cryptographic algorithms
- security properties
- authentication protocol
- key management
- secure communication
- security mechanisms
- artificial immune algorithm
- formal model
- security requirements
- formal methods
- cryptographic protocols
- information security
- wireless sensor networks
- data mining
- databases