共 50 条
- [31] End-to-end security implementation for mobile devices using TLS protocol JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
- [32] Prototype implementation and simulation study of an end-to-end bandwidth regulation scheme BROADBAND ACCESS AND NETWORK MANAGEMENT - NOC '98, 1998, : 24 - 31
- [33] Design and Implementation of an End-to-End Web based Trusted Email System 9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 231 - 238
- [35] An end-to-end Fresnel propagation model for SPEED : PIAACMC implementation and performance GROUND-BASED AND AIRBORNE TELESCOPES VII, 2018, 10700
- [38] End-to-end authorization USENIX ASSOCIATION PROCEEDINGS OF THE FOURTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2000, : 151 - 164