Toward a Broader View of Security Protocols.
Matt BlazePublished in: Security Protocols Workshop (2004)
Keyphrases
- security protocols
- automated design
- security properties
- cryptographic algorithms
- security services
- key management
- artificial immune algorithm
- secure communication
- security mechanisms
- intrusion detection
- database
- security requirements
- authentication protocol
- engineering design
- software architecture
- response time
- data mining