End-to-End Security: When Do We Have It?
Alfred MenezesDouglas StebilaPublished in: IEEE Secur. Priv. (2021)
Keyphrases
- end to end
- admission control
- information security
- ad hoc networks
- wireless ad hoc networks
- congestion control
- intrusion detection
- high bandwidth
- scalable video
- multipath
- network security
- access control
- security policies
- rate adaptation
- rate allocation
- internet protocol
- transport layer
- service delivery
- multi hop
- network management