| contributor author | Ranjan, A.K. | |
| contributor author | Kumar, V. | |
| contributor author | Hussain, M. | |
| date accessioned | 2020-03-12T22:40:58Z | |
| date available | 2020-03-12T22:40:58Z | |
| date issued | 2014 | |
| identifier other | 7019737.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1091047?show=full | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Security analysis of TLS authentication | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8229727 | |
| subject keywords | competitive algorithms | |
| subject keywords | n evolutionary computation | |
| subject keywords | n finite state machines | |
| subject keywords | n game theory | |
| subject keywords | n iterative methods | |
| subject keywords | n optimisation | |
| subject keywords | n TURAN | |
| subject keywords | n competitive nondeterministic models | |
| subject keywords | n dynamic strategy adaptation | |
| subject keywords | n finite state machines | |
| subject keywords | n game theory | |
| subject keywords | n iterated prisoner dilemma | |
| subject keywords | n machine learning community | |
| subject keywords | n move prediction | |
| subject keywords | n nondeterministic player evolution | |
| subject keywords | n payoff maximization | |
| subject keywords | n self-interested being cooperation | |
| subject keywords | n self-interested being trust | |
| subject keywords | n strategy | |
| identifier doi | 10.1109/CEC.2014.6900564 | |
| journal title | ontemporary Computing and Informatics (IC3I), 2014 International Conference on | |
| filesize | 20442859 | |
| citations | 0 | |