Login / Signup
Incentives in Security Protocols.
Sarah Azouvi
Alexander Hicks
Steven J. Murdoch
Published in:
Security Protocols Workshop (2018)
Keyphrases
</>
security protocols
automated design
key management
security properties
cryptographic algorithms
security services
secure communication
artificial immune algorithm
security mechanisms
authentication protocol
cryptographic protocols
mechanism design
database systems
rfid tags
security issues
evolutionary design