Sign in

Using end-to-end data encryption to secure SIP device configuration.

Xudong ChenWenjun Fan
Published in: GrC (2013)
Keyphrases
  • end to end
  • data encryption
  • data confidentiality
  • application layer
  • congestion control
  • multipath
  • encryption algorithm
  • data quality
  • management system