Login / Signup
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT.
Sam Kumar
Yuncong Hu
Michael P. Andersen
Raluca Ada Popa
David E. Culler
Published in:
USENIX Security Symposium (2019)
Keyphrases
</>
end to end
wireless ad hoc networks
management system
ad hoc networks
admission control
key management
high bandwidth
congestion control
content delivery
scalable video
access control
rate allocation
application layer
multipath
encryption scheme
internet protocol
transport layer
packet loss rate