Synthesising Efficient and Effective Security Protocols.

Hao ChenJohn A. ClarkJeremy L. Jacob
Published in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
  • security protocols
  • cost effective
  • databases
  • automated design
  • information systems
  • case study
  • data processing
  • authentication protocol
  • artificial immune algorithm