共 50 条
- [31] Mitigation of Attacks on Email End-to-End Encryption CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1647 - 1664
- [33] Review of End-to-End Encryption for Social Media PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 35 - 38
- [35] BiPass: Enabling End-to-End Full Duplex PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, : 114 - 126
- [36] Achieving predictable and low end-to-end latency for a network of smart services 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
- [37] Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 105 - 123
- [38] Analysis of end-to-end recovery algorithms with preemptive priority in GMPLS networks INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 118 - 127
- [39] Control plane for end-to-end QoS guarantee: A theory and its application 2008 16TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2008, : 293 - 302
- [40] End-to-End Availability of Cloud Services PROCEEDINGS OF THE 2018 22ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 198 - 203