共 50 条
- [42] End-to-end security validation of IoT systems based on digital twins of end-devices [J]. 2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
- [43] Holistic Explainability Requirements for End-to-End Machine Learning in IoT Cloud Systems [J]. 29TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2021), 2021, : 188 - 194
- [46] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [47] An end-to-end authentication protocol in wireless application protocol [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
- [48] Efficient end-to-end authentication protocols for mobile networks [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
- [49] A system for end-to-end authentication of adaptive multimedia content [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
- [50] An End-to-End Mobile Platform for Pervasive Healthcare [J]. 2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC), 2012,