Login / Signup

Token-based authentication and access delegation for HW-accelerated telco cloud solution.

Semih InceDavid EspesGuy GogniatRenaud SantoroJulien Lallet
Published in: CloudNet (2022)
Keyphrases
  • access control
  • conflict resolution
  • security requirements
  • neural network
  • identity authentication