共 50 条
- [1] End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication [J]. Wireless Personal Communications, 2004, 28 : 95 - 106
- [3] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
- [5] A Network Assisted End-to-End Security Protocol for Mobile Applications [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
- [6] An end-to-end authentication protocol in wireless application protocol [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
- [7] Secure End-To-End Authentication for Mobile Banking [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
- [8] End-to-end security implementation for mobile devices using TLS protocol [J]. Journal in Computer Virology, 2006, 2 (1): : 87 - 97
- [9] End-to-end security implementation for mobile devices using TLS protocol [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
- [10] EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 776 - 782