共 50 条
- [2] Two-Factor Authentication with End-to-End Password Security [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
- [4] An end-to-end hardware approach security for the GPRS [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
- [5] Information security on the logistical network: An end-to-end approach [J]. SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
- [7] An End-to-End Security Approach for Digital Document Management [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
- [8] End-to-End Security Methods for UDT Data Transmissions [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
- [10] Embedded end-to-end wireless security with ECDH key exchange [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789