Show simple item record

contributor authorRanjan, A.K.
contributor authorKumar, V.
contributor authorHussain, M.
date accessioned2020-03-12T22:40:58Z
date available2020-03-12T22:40:58Z
date issued2014
identifier other7019737.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1091047?show=full
formatgeneral
languageEnglish
publisherIEEE
titleSecurity analysis of TLS authentication
typeConference Paper
contenttypeMetadata Only
identifier padid8229727
subject keywordscompetitive algorithms
subject keywordsn evolutionary computation
subject keywordsn finite state machines
subject keywordsn game theory
subject keywordsn iterative methods
subject keywordsn optimisation
subject keywordsn TURAN
subject keywordsn competitive nondeterministic models
subject keywordsn dynamic strategy adaptation
subject keywordsn finite state machines
subject keywordsn game theory
subject keywordsn iterated prisoner dilemma
subject keywordsn machine learning community
subject keywordsn move prediction
subject keywordsn nondeterministic player evolution
subject keywordsn payoff maximization
subject keywordsn self-interested being cooperation
subject keywordsn self-interested being trust
subject keywordsn strategy
identifier doi10.1109/CEC.2014.6900564
journal titleontemporary Computing and Informatics (IC3I), 2014 International Conference on
filesize20442859
citations0


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record