共 50 条
- [21] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [22] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
- [23] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
- [25] End-to-end security implementation for mobile devices using TLS protocol [J]. Journal in Computer Virology, 2006, 2 (1): : 87 - 97
- [27] pDCell: an End-to-End Transport Protocol for Mobile Edge Computing Architectures [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 71 - 80
- [28] End-to-end security implementation for mobile devices using TLS protocol [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
- [29] EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 776 - 782
- [30] Open RAN Mobile Access: The View of an Operator on an End-To-End Implementation [J]. 2023 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2023,