There is a mathematical model to evaluate a cryptographic algorithm or an IDS (Intrusion Detection System)? If so, how should it be used and for what purpose?

PS: I'm working on IP-based WSN.

More Anass Rghioui's questions See All
Similar questions and discussions