Login / Signup
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT.
Sam Kumar
Yuncong Hu
Michael P. Andersen
Raluca Ada Popa
David E. Culler
Published in:
CoRR (2019)
Keyphrases
</>
end to end
ad hoc networks
key management
wireless ad hoc networks
management system
multipath
admission control
high bandwidth
content delivery
congestion control
internet protocol
encryption scheme
rate allocation
real time
video data
transport layer