Login / Signup
Using end-to-end data encryption to secure SIP device configuration.
Xudong Chen
Wenjun Fan
Published in:
GrC (2013)
Keyphrases
</>
end to end
data encryption
data confidentiality
application layer
congestion control
multipath
encryption algorithm
data quality
management system