Synthesis of secure adaptors.
José Antonio MartínFabio MartinelliErnesto PimentelPublished in: J. Log. Algebraic Methods Program. (2012)
Keyphrases
- covert channel
- program synthesis
- key management
- security requirements
- neural network
- texture synthesis
- security issues
- lightweight
- integrity verification
- real time
- security management
- standard model
- security protocols
- highly efficient
- wireless sensor networks
- video sequences
- website
- information systems
- search engine
- genetic algorithm
- data mining