END-TO-END SECURITY PROTECTION

被引:4
|
作者
Nazaryan, Levon [1 ]
Panaousis, Emmanouil A. [1 ]
Politis, Christos [1 ]
机构
[1] Kingston Univ, Fac CISM, London, England
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2010年 / 5卷 / 01期
关键词
D O I
10.1109/MVT.2009.935542
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [31] Reducing risk with end-to-end application security automation
    Blake C.
    [J]. 1600, Elsevier Ltd (2020): : 6 - 8
  • [32] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [33] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [34] Establishing End-to-End Security in a Nationwide Network for Telecooperation
    Staemmler, Martin
    Walz, Michael
    Weisser, Gerald
    Engelmann, Uwe
    Weininger, Robert
    Ernstberger, Antonio
    Sturm, Johannes
    [J]. QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 512 - 516
  • [35] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [36] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27
  • [37] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [38] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
  • [39] Information security on the logistical network: An end-to-end approach
    Beck, M
    Plank, JS
    Millar, J
    Atchley, S
    Soltesz, S
    Bassi, A
    Liu, HD
    [J]. SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
  • [40] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253