On-the-Fly Automatic Generation of Security Protocols.
Shinsaku KiyomotoHaruki OtaToshiaki TanakaPublished in: ICEIS (3-2) (2008)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security properties
- key management
- security services
- automatically generate
- artificial immune algorithm
- authentication protocol
- security mechanisms
- secure communication
- cryptographic protocols
- data mining
- rfid tags
- data processing
- wireless sensor networks
- real time