共 50 条
- [1] Traceback for End-to-End Encrypted Messaging [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
- [3] End-to-End Encrypted Messaging Protocols: An Overview [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
- [4] End-to-end Learning for Encrypted Image Retrieval [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
- [5] Enhanced Certificate Transparency and End-to-end Encrypted Mail [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [6] An end-to-end packet delay optimization for QoS in a MANET [J]. Embedded Software and Systems, Proceedings, 2007, 4523 : 653 - 663
- [7] Voice End-to-End Encrypted for TETRA Radiocommunication System [J]. PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
- [8] Snake: an End-to-End Encrypted Online Social Network [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770
- [9] End-to-End Hierarchical Fuzzy Inference Solution [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2018,
- [10] Session key agreement protocol for end-to-end security in MANET [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686