Sciweavers

GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 9 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob