Login / Signup
Modeling and Verifying Security Protocols Using PAT Approach.
Anh Tuan Luu
Published in:
SSIRI (Companion) (2010)
Keyphrases
</>
security protocols
security properties
artificial immune algorithm
automated design
databases
artificial intelligence
cryptographic algorithms
data mining
response time
e government
anomaly detection
operating system
design process