共 50 条
- [1] End-to-end data deduplication for the mobile Web 2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
- [2] SEEMless: Secure End-to-End Encrypted Messaging with less Trust PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
- [3] A Case for End-to-End Deduplication PROCEEDINGS OF 2016 FOURTH IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES (HOTWEB), 2016, : 7 - 13
- [5] Traceback for End-to-End Encrypted Messaging PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
- [7] An End-to-End Secure Solution for IoMT Data Exchange APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 3 - 15
- [8] MOZAIK: An End-to-End Secure Data Sharing Platform PROCEEDINGS OF THE 2ND ACM DATA ECONOMY WORKSHOP, DEC 2023, 2023, : 34 - 40
- [10] Secure end-to-end processing of smart metering data JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2019, 8 (01):