共 50 条
- [41] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
- [42] A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks 2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 698 - 703
- [43] Homomorphic Encryption as End-to-End Solution for Smart Devices INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
- [44] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture Cluster Computing, 2013, 16 : 861 - 871
- [46] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
- [47] P-SIGMA: security aware paging in end-to-end mobility management scheme Wireless Networks, 2013, 19 : 2049 - 2065
- [48] An Encryption Protocol for End-to-end Secure Transmission of SMS 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
- [49] End-to-End Line Drawing Vectorization THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4559 - 4566
- [50] Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,