共 50 条
- [1] Synthesising End-to-End Security Protocols 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
- [2] End-to-end security implementation for mobile devices using TLS protocol JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
- [3] End-to-end security implementation for mobile devices using TLS protocol Journal in Computer Virology, 2006, 2 (1): : 87 - 97
- [4] Methodology and Tools for End-to-End SOA Security Configurations IEEE CONGRESS ON SERVICES 2008, PT I, PROCEEDINGS, 2008, : 307 - +
- [5] Efficient end-to-end authentication protocols for mobile networks PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
- [6] Tailoring End-to-End IP Security Protocols to the Internet of Things 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
- [7] Performance Evaluation of end-to-end security protocols in an Internet of Things 2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
- [8] STREAMING END-TO-END SPEECH RECOGNITION FOR MOBILE DEVICES 2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 6381 - 6385
- [10] A Network Assisted End-to-End Security Protocol for Mobile Applications JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165