共 50 条
- [31] Reducing risk with end-to-end application security automation [J]. 1600, Elsevier Ltd (2020): : 6 - 8
- [32] Security Analysis of End-to-End Encryption for Zoom Meetings [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
- [33] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
- [34] Establishing End-to-End Security in a Nationwide Network for Telecooperation [J]. QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 512 - 516
- [35] The Many Faces of End-to-End Encryption and Their Security Analysis [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
- [36] End-to-End Trust and Security for Internet of Things Applications [J]. COMPUTER, 2018, 51 (04) : 20 - 27
- [37] End-to-end Security for Sleepy Smart Object Networks [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
- [38] End-to-End Security Methods for UDT Data Transmissions [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
- [39] Information security on the logistical network: An end-to-end approach [J]. SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
- [40] Security Analysis of End-to-End Encryption for Zoom Meetings [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253