Login / Signup
End-to-End Authorization.
Jon Howell
David Kotz
Published in:
OSDI (2000)
Keyphrases
</>
end to end
access control
admission control
high bandwidth
security policies
ad hoc networks
congestion control
multipath
wireless ad hoc networks
content delivery
scalable video
multi hop
service delivery
internet protocol