共 50 条
- [2] Performance Evaluation on End-to-End Security Architecture for Mobile Banking System [J]. 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 445 - +
- [3] SIP signaling security for end-to-end communication [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
- [5] Embedded end-to-end wireless security with ECDH key exchange [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789
- [7] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
- [8] A Network Assisted End-to-End Security Protocol for Mobile Applications [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
- [9] End-to-End Security in Delay Tolerant Mobile Social Network [J]. APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54
- [10] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES [J]. 2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170