共 50 条
- [31] End-to-End Management of IoT Applications [J]. 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
- [32] Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 148 - 159
- [33] iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency [J]. PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), 2019, : 166 - 168
- [34] Erratum to: Secure IoT framework and 2D architecture for End-To-End security [J]. The Journal of Supercomputing, 2018, 74 : 3536 - 3536
- [35] Toward the inclusion of end-to-end security in the OM2M platform [J]. The Journal of Supercomputing, 2021, 77 : 4056 - 4080
- [36] Toward the inclusion of end-to-end security in the OM2M platform [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 4056 - 4080
- [37] IoT ETEI: End-to-end IoT device identification method [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
- [38] End-To-End Security for Video Distribution [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
- [39] A transparent end-to-end security solution [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
- [40] An end-to-end security solution for SCTP [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +