End-to-End Security for Personal Telehealth.
Paul KosterMuhammad AsimMilan PetkovicPublished in: MIE (2011)
Keyphrases
- end to end
- access control
- security policies
- wireless ad hoc networks
- intrusion detection
- information security
- high bandwidth
- congestion control
- ad hoc networks
- network security
- multipath
- admission control
- service delivery
- rate allocation
- application layer
- response time
- quality assessment
- service management
- internet protocol
- transport layer