contributor author | Ranjan, A.K. | |
contributor author | Kumar, V. | |
contributor author | Hussain, M. | |
date accessioned | 2020-03-12T22:40:58Z | |
date available | 2020-03-12T22:40:58Z | |
date issued | 2014 | |
identifier other | 7019737.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1091047?show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Security analysis of TLS authentication | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8229727 | |
subject keywords | competitive algorithms | |
subject keywords | n evolutionary computation | |
subject keywords | n finite state machines | |
subject keywords | n game theory | |
subject keywords | n iterative methods | |
subject keywords | n optimisation | |
subject keywords | n TURAN | |
subject keywords | n competitive nondeterministic models | |
subject keywords | n dynamic strategy adaptation | |
subject keywords | n finite state machines | |
subject keywords | n game theory | |
subject keywords | n iterated prisoner dilemma | |
subject keywords | n machine learning community | |
subject keywords | n move prediction | |
subject keywords | n nondeterministic player evolution | |
subject keywords | n payoff maximization | |
subject keywords | n self-interested being cooperation | |
subject keywords | n self-interested being trust | |
subject keywords | n strategy | |
identifier doi | 10.1109/CEC.2014.6900564 | |
journal title | ontemporary Computing and Informatics (IC3I), 2014 International Conference on | |
filesize | 20442859 | |
citations | 0 | |