共 50 条
- [44] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
- [45] Deep Learning for Detecting Network Attacks: An End-to-End Approach DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 221 - 234
- [46] ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor PROCEEDINGS OF THE 8TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2024, 2024, : 219 - 220
- [47] RIMformer: An End-to-End Transformer for FMCW Radar Interference Mitigation IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62
- [48] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications 2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506
- [50] Design of Cryptographic model for End-to-End Encryption in FPGA based systems PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465