Login / Signup
Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios.
Maria-Camilla Fiazza
Michele Peroli
Luca Viganò
Published in:
Frontiers ICT (2015)
Keyphrases
</>
security protocols
authentication protocol
automated design
ddos attacks
security properties
cryptographic algorithms
digital libraries
secret key
security mechanisms
security services
key management
artificial immune algorithm