Login / Signup
Simulation of Security Protocols based on Scenarios of Attacks.
Gizela Jakubowska
Piotr Dembinski
Wojciech Penczek
Maciej Szreter
Published in:
Fundam. Informaticae (2009)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
security services
security properties
security mechanisms
cryptographic protocols
authentication protocol
secure communication
key management
artificial immune algorithm
real time
ad hoc networks