共 50 条
- [1] Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT 2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 523 - 530
- [2] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249
- [3] A Model-Specific End-to-End Design Methodology for Resource-Constrained TinyML Hardware 2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
- [4] Resource-Constrained Specific Emitter Identification Using End-to-End Sparse Feature Selection IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6067 - 6072
- [7] IoT ETEI: End-to-end IoT device identification method 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
- [9] Using End-to-end Data Encryption to Secure SIP Device Configuration 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63
- [10] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536