Guidelines for 5G End to End Architecture and Security Issues.
Ta-Hao TingTsung-Nan LinShan-Hsiang ShenYu-Wei ChangPublished in: CoRR (2019)
Keyphrases
- end to end
- security issues
- information security
- security mechanisms
- security threats
- enterprise network
- congestion control
- ad hoc networks
- cloud computing
- admission control
- wireless ad hoc networks
- multipath
- real time
- transport layer
- differentiated services
- high bandwidth
- application layer
- service delivery
- information systems
- real world
- internet protocol
- rfid tags
- network architecture
- network security