Login / Signup
Security protocols in a nutshell.
Mohsen Toorani
Published in:
CoRR (2016)
Keyphrases
</>
security protocols
security services
cryptographic algorithms
automated design
authentication protocol
security mechanisms
security properties
key management
security requirements
artificial immune algorithm
cryptographic protocols
secure communication