Sign in

Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing.

Sultan AlasmariWeichao WangYu Wang
Published in: ICCNS (2020)
Keyphrases
  • access control
  • network traffic
  • security services
  • peer to peer
  • computer networks
  • network management
  • information technology
  • user behavior
  • network structure
  • key management
  • security protocols