Skip to main content
. 2020 Jun 12;12155:200–212. doi: 10.1007/978-3-030-52794-5_15

Fig. 1.

Fig. 1.

Task separation of the security protocol layer and the network stack with the third Input/Output-controller on the left