|
Volumn , Issue , 2009, Pages 433-437
|
Research on the implementation of secure UPnP architecture
|
Author keywords
Access control; Group communication; Group key management; Network security; UPnP
|
Indexed keywords
CORRESPONDING MEASURES;
GROUP KEY MANAGEMENT;
IN-NETWORK;
KEY MANAGEMENT;
KEY MANAGEMENT MECHANISM;
LAYER PROTOCOLS;
NETWORK DEVICES;
NETWORK SETUP;
PLUG AND PLAY;
POINT TO POINT;
SECURE ARCHITECTURES;
SECURE COMMUNICATIONS;
UNIVERSAL PLUG AND PLAY;
UPNP DEVICES;
ACCESS CONTROL;
BROADBAND NETWORKS;
NETWORK ARCHITECTURE;
NETWORK PROTOCOLS;
SECURITY SYSTEMS;
NETWORK SECURITY;
|
EID: 74549159645
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICBNMT.2009.5348530 Document Type: Conference Paper |
Times cited : (3)
|
References (7)
|