END-TO-END SECURITY PROTECTION

被引:4
|
作者
Nazaryan, Levon [1 ]
Panaousis, Emmanouil A. [1 ]
Politis, Christos [1 ]
机构
[1] Kingston Univ, Fac CISM, London, England
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2010年 / 5卷 / 01期
关键词
D O I
10.1109/MVT.2009.935542
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [21] An end-to-end home network security framework
    Tak, S
    Dixit, S
    Park, EK
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (05) : 412 - 422
  • [22] End-to-end security in telemedical networks - A practical guideline
    Wozak, Florian
    Schabetsberger, Thomas
    Ammmenwerth, Elske
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 484 - 490
  • [23] End-to-End Security for At-Home Medical Monitoring
    Subramanian, Mohanavalli Seetha
    Anand, Sheila
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 483 - +
  • [24] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [25] Benefits of end-to-end IP for cyber and physical security
    Seewald, M. G.
    [J]. 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [26] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [27] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
  • [28] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27
  • [29] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [30] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,