Login / Signup
Security Protocol for Active Networks.
Lawrence Cheng
Alex Galis
Published in:
ICON (2006)
Keyphrases
</>
security protocols
artificial immune algorithm
automated design
cryptographic algorithms
security services
real time
social networks
authentication protocol