Showing 1 - 3 results of 3 for search '(("evolution computing") OR ("evaluation computing"))', query time: 0.10s Refine Results
  1. 1

    Method of designing security protocol for remote attestation by YU Rong-wei1, WANG Li-na1, KUANG Bo1

    Published 2008-01-01
    Subjects: “…remote attestation;verification protocol;evolution computing;BAN-like logic…”
    Get full text
    Article
  2. 2
  3. 3