共 50 条
- [21] Enhanced Security Framework for E-Health Systems using Blockchain JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 239 - 250
- [22] A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks 2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 698 - 703
- [24] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY. Systems, computers, controls, 1982, 13 (03): : 59 - 69
- [25] P-SIGMA: security aware paging in end-to-end mobility management scheme Wireless Networks, 2013, 19 : 2049 - 2065
- [26] An Approach for End-to-End (E2E) Security of 5G Applications 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 133 - 138
- [27] End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things IEEE ACCESS, 2025, 13 : 20584 - 20598
- [28] End-to-end security implementation for mobile devices using TLS protocol Journal in Computer Virology, 2006, 2 (1): : 87 - 97
- [29] Providing End-to-End Security Using Quantum Walks in IoT Networks IEEE ACCESS, 2020, 8 : 92687 - 92696
- [30] End-to-end security implementation for mobile devices using TLS protocol JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97