共 50 条
- [21] Secure Provisioning for Achieving End-to-End Secure Communications AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
- [22] End-to-end Secure Insurance Telematics SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
- [24] Enhanced Certificate Transparency and End-to-end Encrypted Mail 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [25] Injection Attacks Against End-to-End Encrypted Applications 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2648 - 2665
- [26] A Formal Treatment of End-to-End Encrypted Cloud Storage ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 40 - 74
- [27] Cloud Challenge: Secure End-to-End Processing of Smart Metering Data 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 36 - 42
- [28] Voice End-to-End Encrypted for TETRA Radiocommunication System PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
- [29] Snake: an End-to-End Encrypted Online Social Network 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770
- [30] Using End-to-end Data Encryption to Secure SIP Device Configuration 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63