共 50 条
- [41] Scalable end-to-end security for advanced metering infrastructures [J]. INFORMATION SYSTEMS, 2015, 53 : 213 - 223
- [42] Methodology and Tools for End-to-End SOA Security Configurations [J]. IEEE CONGRESS ON SERVICES 2008, PT I, PROCEEDINGS, 2008, : 307 - +
- [43] Reducing risk with end-to-end application security automation [J]. 1600, Elsevier Ltd (2020): : 6 - 8
- [44] Security Analysis of End-to-End Encryption for Zoom Meetings [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
- [45] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
- [46] Establishing End-to-End Security in a Nationwide Network for Telecooperation [J]. QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 512 - 516
- [47] The Many Faces of End-to-End Encryption and Their Security Analysis [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
- [48] End-to-End Trust and Security for Internet of Things Applications [J]. COMPUTER, 2018, 51 (04) : 20 - 27
- [49] End-to-end Security for Sleepy Smart Object Networks [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
- [50] End-to-End Security Methods for UDT Data Transmissions [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393