Polymorphic Encryption and Pseudonymisation of IP Network Flows.
Abraham WesterbaanLuuk HendriksPublished in: CoRR (2019)
Keyphrases
- network flow
- virtual private network
- linear programming
- min cost
- integer programming
- minimum cost
- encryption algorithms
- optimization model
- encryption algorithm
- encryption scheme
- ip networks
- image encryption
- application layer
- data encryption
- security properties
- bipartite graph
- secret key
- security analysis
- key exchange
- key management
- multi objective