Title
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms
Abstract
The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile adhoc networks and electronic voting or auctions applications. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the Genetic Algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols the evaluation function is critical. We discuss how can be defined several basic criteria for evaluating security protocols and present some examples for evaluation of different protocols.
Year
DOI
Venue
2007
10.1109/ARES.2007.83
ARES
Keywords
Field
DocType
genetic algorithms,automated tool generating protocol,auctions application,automatic design,electronic voting,basic criterion,evaluation function,synthesizing security protocols,different protocol,security networked protocol,security protocol,algorithm design and analysis,cryptographic protocols,cryptography,data security,telematics,genetic algorithm,genetic engineering,network protocol,mobile ad hoc network
Data security,Electronic voting,Algorithm design,Cryptographic protocol,Cryptography,Computer security,Computer science,Evaluation function,Common value auction,Genetic algorithm,Distributed computing
Conference
ISBN
Citations 
PageRank 
0-7695-2775-2
3
0.42
References 
Authors
3
3
Name
Order
Citations
PageRank
Luis Zarza160.81
Josep Pegueroles2659.91
Miguel Soriano328638.26