Login / Signup
Authentication tests and disjoint encryption: A design method for security protocols.
Joshua D. Guttman
Published in:
J. Comput. Secur. (2004)
Keyphrases
</>
similarity measure
artificial immune algorithm