共 50 条
- [31] An End-to-End Exponentially Secure Secrecy Scheme against an Unbounded Adversary [J]. 2013 47TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2013,
- [32] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT [J]. 2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
- [34] Secure End-to-End VoLTE based on Ethereum Blockchain [J]. 2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 128 - 132
- [35] Quantum-resistant End-to-End Secure Messaging and Email Communication [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
- [38] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. Cluster Computing, 2013, 16 : 861 - 871
- [39] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
- [40] A Novel Visual Cryptography Scheme Based on Substitution Cipher [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 640 - 643