| contributor author | Ranjan, A.K. |  | 
| contributor author | Kumar, V. |  | 
| contributor author | Hussain, M. |  | 
| date accessioned | 2020-03-12T22:40:58Z |  | 
| date available | 2020-03-12T22:40:58Z |  | 
| date issued | 2014 |  | 
| identifier other | 7019737.pdf |  | 
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1091047?locale-attribute=fa&show=full |  | 
| format | general |  | 
| language | English |  | 
| publisher | IEEE |  | 
| title | Security analysis of TLS authentication |  | 
| type | Conference Paper |  | 
| contenttype | Metadata Only |  | 
| identifier padid | 8229727 |  | 
| subject keywords | competitive algorithms |  | 
| subject keywords | n			evolutionary computation |  | 
| subject keywords | n			finite state machines |  | 
| subject keywords | n			game theory |  | 
| subject keywords | n			iterative methods |  | 
| subject keywords | n			optimisation |  | 
| subject keywords | n			TURAN |  | 
| subject keywords | n			competitive nondeterministic models |  | 
| subject keywords | n			dynamic strategy adaptation |  | 
| subject keywords | n			finite state machines |  | 
| subject keywords | n			game theory |  | 
| subject keywords | n			iterated prisoner dilemma |  | 
| subject keywords | n			machine learning community |  | 
| subject keywords | n			move prediction |  | 
| subject keywords | n			nondeterministic player evolution |  | 
| subject keywords | n			payoff maximization |  | 
| subject keywords | n			self-interested being cooperation |  | 
| subject keywords | n			self-interested being trust |  | 
| subject keywords | n			strategy |  | 
| identifier doi | 10.1109/CEC.2014.6900564 |  | 
| journal title | ontemporary Computing and Informatics (IC3I), 2014 International Conference on |  | 
| filesize | 20442859 |  | 
| citations | 0 |  |