Toward a Broader View of Security Protocols (Transcript of Discussion).
Matt BlazePublished in: Security Protocols Workshop (2004)
Keyphrases
- security protocols
- automated design
- artificial immune algorithm
- cryptographic algorithms
- security services
- key management
- authentication protocol
- secure communication
- database systems
- security mechanisms
- cryptographic protocols
- security properties
- data mining
- wireless sensor networks
- low cost
- information systems
- artificial intelligence
- real time