Login / Signup
Strand-Based Approach to Patch Security Protocols.
Dieter Hutter
Raúl Monroy
Published in:
CoRR (2013)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security properties
authentication protocol
image patches
security services
key management
security mechanisms
artificial immune algorithm
cryptographic protocols
secure communication
data processing
operating system
rfid tags