共 50 条
- [1] Development of a end-to-end Cloud Computing MetOcean solution [J]. OCEANS 2016 MTS/IEEE MONTEREY, 2016,
- [2] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing [J]. IEEE ACCESS, 2020, 8 : 16750 - 16759
- [3] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security [J]. INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
- [4] An end-to-end hardware approach security for the GPRS [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
- [5] End-to-end Security Architecture for Federated Cloud and IoT Networks [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 463 - 468
- [7] SECUPerf: End-to-End Security and Performance Assessment of Cloud Services [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1747 - 1752
- [8] From IoT to Cloud: An End-to-End Virtualization Approach [J]. 2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1554 - 1557
- [9] Selective End-To-End Data-Sharing in the Cloud [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 175 - 195
- [10] Selective end-to-end data-sharing in the cloud [J]. Journal of Banking and Financial Technology, 2020, 4 (1): : 139 - 157