top-1

top-2 top-3

top-4 top-5

menutop

   Program

 

   Committee

 

   Author Index

 

   Search

 

   About GECCO

 

   CD Tech Support

menubot2

 

 

 

 

Session:

Workshop - Military and Security Applications of Evolutionary Computation

Title:

Designing Secure Communication Using Evolutionary Approach

 

 

Authors:

Pavel Ocenasek
Jiri Ocenasek

 

 

Abstract:

This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the outline of the evolutionary optimization framework and the techniques that can be used to automatically evolve basic security protocols.

 

 

CD-ROM Produced by X-CD Technologies