共 50 条
- [31] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES 2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170
- [33] An end-to-end security solution for SCTP ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
- [34] A transparent end-to-end security solution INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
- [35] Synthesising End-to-End Security Protocols 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
- [36] End-to-End Security for Personal Telehealth USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
- [37] End-to-End Security for Enterprise Mashups SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
- [38] End-to-end security for GSM users 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
- [39] WAP performance on an end-to-end scheme LONDON COMMUNICATIONS SYMPOSIUM 2001, PROCEEDINGS, 2001, : 183 - 186
- [40] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249