A Composable Security Treatment of the Lightning Network.
Aggelos KiayiasOrfeas Stefanos Thyfronitis LitosPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- security threats
- security protection
- enterprise network
- complex networks
- security issues
- internet service providers
- network model
- network security
- computer networks
- application level
- network communication
- network traffic
- network connection
- peer to peer
- network architecture
- network management
- wireless sensor networks
- cyber attacks
- network layer
- access control
- virtual private network