共 50 条
- [21] Security Analysis of End-to-End Encryption for Zoom Meetings IEEE ACCESS, 2021, 9 : 90677 - 90689
- [22] Homomorphic Encryption as End-to-End Solution for Smart Devices INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
- [23] Security Analysis of End-to-End Encryption for Zoom Meetings INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
- [24] The Many Faces of End-to-End Encryption and Their Security Analysis 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
- [25] An Encryption Protocol for End-to-end Secure Transmission of SMS 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
- [26] Detecting Sexually Explicit Content in the Context of the Child Sexual Abuse Materials (CSAM): End-to-End Classifiers and Region-Based Networks MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2023, PT II, 2025, 2134 : 154 - 168
- [28] Predicting Internet end-to-end delay: An overview PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 210 - 214
- [29] End-to-End Encrypted Messaging Protocols: An Overview INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254