Login / Signup
Security Protocols with Isotropic Channels.
Madhukar Anand
Eric Cronin
Micah Sherr
Matt Blaze
Sampath Kannan
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
key management
security properties
artificial immune algorithm
authentication protocol
secure communication
security mechanisms
cryptographic protocols
wireless sensor networks
anomaly detection
security requirements