Login / Signup
Device Identity Management and End-to-End Security.
Jacques Latour
Natasha D'Souza
Published in:
IEEE Netw. (2021)
Keyphrases
</>
end to end
identity management
access control
personal information
cloud computing
user centric
wireless ad hoc networks
security policies
ad hoc networks
multipath
congestion control
admission control
text localization and recognition
social networks
internet protocol
design choices
data management
social media