Formal security proof for a scheme on a topological network.
Roberto CivinoRiccardo LongoPublished in: Adv. Math. Commun. (2023)
Keyphrases
- network management
- computer networks
- security threats
- network traffic
- virtual private network
- cyber attacks
- intrusion detection and prevention
- enterprise network
- security measures
- peer to peer
- authentication scheme
- network layer
- security protection
- ns simulator
- secret sharing scheme
- intrusion detection
- communication networks
- network security
- security requirements
- digital signature scheme
- provably secure
- blind signature scheme
- protection scheme
- remote server
- internet service providers
- security issues
- authentication mechanism
- buffer overflow
- denial of service attacks
- link prediction
- security model
- key distribution