Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.
Naoto YanaiMasahiro MamboKazuma TanakaTakashi NishideEiji OkamotoPublished in: INTRUST (2015)
Keyphrases
- network management
- security protection
- fully connected
- malicious traffic
- enterprise network
- dynamic networks
- peer to peer
- network structure
- network traffic
- security threats
- wireless sensor networks
- virtual private network
- network connection
- application level
- small world
- security issues
- network security
- forensic analysis
- intrusion detection and prevention
- computer networks
- community structure
- security measures
- communication networks
- network model
- random graphs
- security policies
- graph matching
- network layer
- spanning tree
- highly connected
- critical infrastructure
- directed graph
- finding the shortest path
- access control
- social networks