Vulnerability-Tolerant Transport Layer Security.
André JoaquimMiguel L. PardalMiguel CorreiaPublished in: OPODIS (2017)
Keyphrases
- transport layer
- network layer
- physical layer
- end to end
- application layer
- network monitoring
- access control
- information security
- cross layer
- intrusion detection
- wireless communication
- security policies
- key management
- routing protocol
- rate control
- computer networks
- security issues
- network congestion
- network security
- network architecture
- streaming data
- resource utilization
- computational complexity