Login / Signup
Tailoring end-to-end IP security protocols to the Internet of Things.
René Hummen
Hanno Wirtz
Jan Henrik Ziegeldorf
Jens Hiller
Klaus Wehrle
Published in:
ICNP (2013)
Keyphrases
</>
end to end
security protocols
internet protocol
application layer
key management
automated design
ad hoc networks
transport layer
mobile devices
congestion control
admission control
wireless ad hoc networks
multipath
security mechanisms
ip address
multi hop
operating system
data streams