Login / Signup
An Approach for End-to-End (E2E) Security of 5G Applications.
K. Anitha Kumari
G. Sudha Sadasivam
S. Shymala Gowri
Sebastin Arockia Akash
E. G. Radhika
Published in:
BigDataSecurity/HPSC/IDS (2018)
Keyphrases
</>
end to end
admission control
ad hoc networks
multipath
congestion control
information security
network security
key management
access control
intrusion detection
wireless ad hoc networks
application layer
transport layer
real world
high bandwidth
security policies
rate allocation
network monitoring