Login / Signup
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion).
A. W. Roscoe
Published in:
Security Protocols Workshop (2016)
Keyphrases
</>
response time
security protocols
automated design
cryptographic algorithms
security mechanisms
security services
key management
artificial immune algorithm
security properties
authentication protocol
cryptographic protocols
secure communication
real time
data mining
security requirements