END-TO-END SECURITY PROTECTION

被引:4
|
作者
Nazaryan, Levon [1 ]
Panaousis, Emmanouil A. [1 ]
Politis, Christos [1 ]
机构
[1] Kingston Univ, Fac CISM, London, England
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2010年 / 5卷 / 01期
关键词
D O I
10.1109/MVT.2009.935542
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [41] End-to-End Security: When Do We Have It?
    Menezes, Alfred
    Stebila, Douglas
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (04) : 60 - 64
  • [42] Safely Using the AUTOSAR End-to-End Protection Library
    Arts, Thomas
    Tonetta, Stefano
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2015, 2015, 9337 : 74 - 89
  • [43] Verena: End-to-End Integrity Protection for Web Applications
    Karapanos, Nikolaos
    Filios, Alexandros
    Popa, Raluca Ada
    Capkun, Srdjan
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 895 - 913
  • [44] End-to-end header protection in signed S/MIME
    Liao, Lijun
    Schwenk, Joerg
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1646 - 1658
  • [45] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs
    Patra, Rabin
    Surana, Sonesh
    Nedevschi, Sergiu
    [J]. 2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
  • [46] End-to-End Security in Delay Tolerant Mobile Social Network
    Rani, Rinki
    Katti, C. P.
    [J]. APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54
  • [47] An end-to-end assessment of extreme weather impacts on food security
    Chavez, Erik
    Conway, Gordon
    Ghil, Michael
    Sadler, Marc
    [J]. NATURE CLIMATE CHANGE, 2015, 5 (11) : 997 - +
  • [48] Session key agreement protocol for end-to-end security in MANET
    Lim, Jeong-Mi
    Park, Chang-Seop
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686
  • [49] Embedded end-to-end wireless security with ECDH key exchange
    Kumar, S
    Girimondo, M
    Weimerskirch, A
    Paar, C
    Patel, A
    Wander, AS
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789
  • [50] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287