共 50 条
- [32] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
- [33] End-to-End Sample Tracking in the Laboratory Using a Custom Internet of Things Device [J]. SLAS TECHNOLOGY, 2018, 23 (05): : 412 - 422
- [34] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [36] END-TO-END SECURITY PROTECTION [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
- [37] Integrated transport layer security: End-to-end security model between WTLS and TLS [J]. 15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 65 - 71
- [39] An End-to-End Trainable Feature Selection-Forecasting Architecture Targeted at the Internet of Things [J]. IEEE ACCESS, 2021, 9 : 104011 - 104028