Login / Signup
Synthesising Efficient and Effective Security Protocols.
Hao Chen
John A. Clark
Jeremy L. Jacob
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
cost effective
databases
automated design
information systems
case study
data processing
authentication protocol
artificial immune algorithm