Login / Signup
An environmental paradigm for defending security protocols.
Maria-Camilla Fiazza
Michele Peroli
Luca Viganò
Published in:
CTS (2012)
Keyphrases
</>
security protocols
automated design
security services
cryptographic algorithms
artificial immune algorithm
security properties
key management
security mechanisms
authentication protocol
rfid tags
secure communication
security requirements
web services
case study
operating system
cryptographic protocols