共 50 条
- [1] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [2] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things [J]. 2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100
- [6] Internet of Things: An End-to-End Security Layer [J]. PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
- [7] A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 956 - 963
- [8] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
- [9] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,