Security analysis of TLS authentication
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/CEC.2014.6900564
کلیدواژه(گان): competitive algorithms,n evolutionary computation,n finite state machines,n game theory,n iterative methods,n optimisation,n TURAN,n competitive nondeterministic models,n dynamic strategy adaptation,n finite state machines,n game theory,n iterated prisoner dilemma,n machine learning community,n move prediction,n nondeterministic player evolution,n payoff maximization,n self-interested being cooperation,n self-interested being trust,n strategy
کالکشن
:
-
آمار بازدید
Security analysis of TLS authentication
Show full item record
contributor author | Ranjan, A.K. | |
contributor author | Kumar, V. | |
contributor author | Hussain, M. | |
date accessioned | 2020-03-12T22:40:58Z | |
date available | 2020-03-12T22:40:58Z | |
date issued | 2014 | |
identifier other | 7019737.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1091047 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Security analysis of TLS authentication | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8229727 | |
subject keywords | competitive algorithms | |
subject keywords | n evolutionary computation | |
subject keywords | n finite state machines | |
subject keywords | n game theory | |
subject keywords | n iterative methods | |
subject keywords | n optimisation | |
subject keywords | n TURAN | |
subject keywords | n competitive nondeterministic models | |
subject keywords | n dynamic strategy adaptation | |
subject keywords | n finite state machines | |
subject keywords | n game theory | |
subject keywords | n iterated prisoner dilemma | |
subject keywords | n machine learning community | |
subject keywords | n move prediction | |
subject keywords | n nondeterministic player evolution | |
subject keywords | n payoff maximization | |
subject keywords | n self-interested being cooperation | |
subject keywords | n self-interested being trust | |
subject keywords | n strategy | |
identifier doi | 10.1109/CEC.2014.6900564 | |
journal title | ontemporary Computing and Informatics (IC3I), 2014 International Conference on | |
filesize | 20442859 | |
citations | 0 |