Login / Signup
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms.
Luis Zarza
Josep Pegueroles
Miguel Soriano
Published in:
ARES (2007)
Keyphrases
</>
evaluation function
security protocols
genetic algorithm
automated design
alpha beta
temporal difference
artificial immune algorithm
two player games
computer chess
key management
evolutionary algorithm
evolutionary computation
real time
iterative deepening
security properties
security services
expected outcome