Internet Security Protocols.
Walter FumyPublished in: State of the Art in Applied Cryptography (1997)
Keyphrases
- security protocols
- security mechanisms
- automated design
- cryptographic algorithms
- security properties
- artificial immune algorithm
- key management
- databases
- resource constrained
- authentication protocol
- smart card
- information systems
- secret key
- cryptographic protocols
- security requirements
- secure communication
- temporal information