Login / Signup

Making Constrained Things Reachable: A Secure IP-Agnostic NAT Traversal Approach for IoT.

Oscar Novo
Published in: ACM Trans. Internet Techn. (2019)
Keyphrases
  • key management
  • management system
  • data structure
  • tree structure
  • mobile computing
  • smart card
  • security requirements
  • ip networks