Login / Signup
Investigating the Performances and Vulnerabilities of Two New Protocols Based on R-RAPSE.
Seyed Salman Sajjadi GhaemMaghami
Afrooz Haghbin
Mahtab Mirmohseni
Published in:
CoRR (2016)
Keyphrases
</>
information security
neural network
case study
security mechanisms
security properties
security vulnerabilities
database
data sets
data mining
communication protocol
cryptographic protocols
voting protocols