Login / Signup

Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things.

Yuteng LuMeng Sun
Published in: SEKE (2018)
Keyphrases
  • security protocols
  • cryptographic algorithms
  • metadata
  • database systems
  • artificial immune algorithm
  • information systems
  • distributed systems
  • security requirements
  • security mechanisms