How Do Smart Contracts Benefit Security Protocols?
Rujia LiQin WangQi WangDavid GalindoPublished in: CoRR (2022)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security services
- secure communication
- security properties
- artificial immune algorithm
- supply chain
- authentication protocol
- security mechanisms
- key management
- cryptographic protocols
- database systems
- real time
- security requirements
- software systems
- case study