Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver.

Florian AdamskySyed Ali KhayamRudolf JägerMuttukrishnan Rajarajan
Published in: CyberC (2012)
Keyphrases
  • security analysis
  • transport protocol
  • security requirements
  • end to end
  • smart card
  • real time
  • public key
  • rate adaptation
  • video streaming
  • congestion control
  • ip networks
  • motion estimation
  • wireless networks