Avoiding Redundancies and Conflicts in Security Protocols.
Ibrahim S. AbdullahEdgar H. SibleySultan AljahdaliPublished in: CATA (2003)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security services
- security properties
- conflict resolution
- artificial immune algorithm
- secure communication
- authentication protocol
- security mechanisms
- key management
- security requirements
- real time
- cryptographic protocols
- operating system
- sensor networks
- artificial intelligence
- databases