Login / Signup

Security Protocol for Active Networks.

Lawrence ChengAlex Galis
Published in: ICON (2006)
Keyphrases
  • security protocols
  • artificial immune algorithm
  • automated design
  • cryptographic algorithms
  • security services
  • real time
  • social networks
  • authentication protocol