Login / Signup
Type-preserving compilation of end-to-end verification of security enforcement.
Juan Chen
Ravi Chugh
Nikhil Swamy
Published in:
PLDI (2010)
Keyphrases
</>
end to end
security enforcement
access control
multipath
admission control
congestion control
wireless ad hoc networks
ad hoc networks
high bandwidth
smart card
application layer
scalable video
internet protocol
multi hop
rate allocation