Login / Signup
A Transparent End-to-End Security Solution.
Shince Thomas
Devesh Misra
P. R. Lakshmi Eswari
N. Sarat Chandra Babu
Published in:
ICISS (2005)
Keyphrases
</>
end to end
wireless ad hoc networks
congestion control
high bandwidth
information security
multipath
admission control
ad hoc networks
access control
rate allocation
content delivery
scalable video
intrusion detection
response time
internet protocol
transport layer
packet loss rate