共 5 条
- [1] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
- [2] Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 581 - 588
- [3] Trust based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 1757 - 1760
- [4] SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets The Journal of Supercomputing, 2021, 77 : 3516 - 3554
- [5] SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 3516 - 3554