Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions.
Mario BarbareschiValentina CasolaDaniele LombardiPublished in: CloudCom (2023)
Keyphrases
- end to end
- admission control
- wireless ad hoc networks
- high bandwidth
- real world
- congestion control
- transport layer
- information security
- internet protocol
- ad hoc networks
- network security
- multipath
- content delivery
- scalable video
- packet loss rate
- physical layer
- rate allocation
- service delivery
- intrusion detection
- access control