共 50 条
- [31] Injection Attacks Against End-to-End Encrypted Applications 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2648 - 2665
- [32] The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
- [33] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
- [36] Securing SCADA Applications Using OpenPLC With End-To-End Encryption 3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
- [37] End-to-end Encryption for SMS Messages in the Health Care Domain CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
- [38] Integrating end-to-end encryption and authentication technology into broadband networks INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
- [40] Towards Efficient End-to-End Encryption for Container Checkpointing Systems PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66