共 50 条
- [41] Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security 2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 123 - +
- [42] Implementing end-to-end encryption strategist for strengthening data security across network communication JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
- [43] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing IEEE ACCESS, 2020, 8 : 16750 - 16759
- [44] End-to-End Verification for Subgraph Solving THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 8, 2024, : 8038 - 8047
- [45] End-to-end Verification of QoS Policies 2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 426 - 434
- [48] System of end-to-end symmetric database encryption INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
- [49] On Track of Sigfox Confidentiality with End-to-End Encryption 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,