共 50 条
- [31] End-To-End Security for Video Distribution [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
- [32] End-to-End Security for Personal Telehealth [J]. USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
- [33] End-to-End Security for Enterprise Mashups [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
- [34] Synthesising End-to-End Security Protocols [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
- [35] A transparent end-to-end security solution [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
- [36] An end-to-end security solution for SCTP [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
- [37] End-to-end security for GSM users [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
- [38] End To End Cloud Computing Architecture Based On A Novel Classification Of Security Issues [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 303 - 310
- [40] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION [J]. EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114