Keyphrases
- security protocols
- automated design
- network management
- network monitoring
- security services
- cryptographic algorithms
- security properties
- key management
- cryptographic protocols
- artificial immune algorithm
- secure communication
- authentication protocol
- security requirements
- rfid tags
- security policies
- computer networks
- data mining