Login / Signup
Security, Protocols, and Trust.
Joshua D. Guttman
Published in:
VMCAI (2004)
Keyphrases
</>
security protocols
security services
automated design
security properties
cryptographic algorithms
trust model
key management
authentication protocol
security mechanisms
secure communication
artificial immune algorithm
cryptographic protocols
rfid tags
cost effective