共 50 条
- [5] Application Layer Key Establishment for End-to-End Security in IoT [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
- [6] End-To-End Security for Video Distribution [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
- [7] Synthesising End-to-End Security Protocols [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
- [8] An end-to-end security solution for SCTP [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
- [9] A transparent end-to-end security solution [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
- [10] Enforcing End-to-End Application Security in the Cloud (Big Ideas Paper) [J]. MIDDLEWARE 2010, 2010, 6452 : 293 - +