Login / Signup
Synthesising End-to-End Security Protocols.
Charles Thevathayan
Peter Bertók
George Fernandez
Published in:
TrustCom (2014)
Keyphrases
</>
end to end
security protocols
key management
ad hoc networks
automated design
wireless ad hoc networks
artificial immune algorithm
admission control
congestion control
multipath
security mechanisms
security requirements
rfid tags
transport layer
image quality
application layer
scalable video
quality of service