Security and performance evaluation of security protocols.
Richard R. BrooksBenafsh HusainSeokBae YunJuan DengPublished in: CSIIRW (2013)
Keyphrases
- security protocols
- security properties
- security services
- automated design
- security mechanisms
- cryptographic algorithms
- key management
- authentication protocol
- cryptographic protocols
- artificial immune algorithm
- secure communication
- security requirements
- resource constrained
- rfid tags
- operating system
- security issues
- ad hoc networks