Login / Signup
Middleware for Automated Implementation of Security Protocols.
Béla Genge
Piroska Haller
Published in:
ESWC (2009)
Keyphrases
</>
security protocols
automated design
authentication protocol
engineering design
real time
distributed systems
evolutionary design
artificial immune algorithm
databases
intrusion detection
security properties
cryptographic algorithms