Proceedings of the 2nd Workshop on Cyber-Security Arms Race 2020
DOI: 10.1145/3411505.3418439
|View full text |Cite
|
Sign up to set email alerts
|

Short Paper

Abstract: Data confidentiality, integrity and authentication are security properties which are often enforced with the generation of secure channels, such as Virtual Private Networks, over unreliable network infrastructures. Traditionally, the configuration of the systems responsible of encryption operations is performed manually. However, the advent of software-based paradigms, such as Software-Defined Networking and Network Functions Virtualization, has introduced new arms races. In particular, even though network man… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
references
References 24 publications
(25 reference statements)
0
0
0
Order By: Relevance