Login / Signup
An Extensible Platform for Evaluating Security Protocols.
Seny Kamara
Darren Davis
Lucas Ballard
Ryan Caudy
Fabian Monrose
Published in:
Annual Simulation Symposium (2005)
Keyphrases
</>
security protocols
automated design
artificial immune algorithm
cryptographic algorithms
real time
security properties
authentication protocol
security mechanisms
key management
secure communication
security services
security requirements
rfid tags
low cost
quality of service
response time
database systems