共 50 条
- [42] Safely Using the AUTOSAR End-to-End Protection Library [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2015, 2015, 9337 : 74 - 89
- [43] Verena: End-to-End Integrity Protection for Web Applications [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 895 - 913
- [44] End-to-end header protection in signed S/MIME [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1646 - 1658
- [45] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs [J]. 2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
- [46] End-to-End Security in Delay Tolerant Mobile Social Network [J]. APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54
- [48] Session key agreement protocol for end-to-end security in MANET [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686
- [49] Embedded end-to-end wireless security with ECDH key exchange [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789
- [50] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287