Inproceedings,

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT.

, , , , and .
USENIX Security Symposium, page 1519-1536. USENIX Association, (2019)

Meta data

Tags

Users

  • @dblp

Comments and Reviews