共 27 条
- [1] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
- [2] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture Cluster Computing, 2013, 16 : 861 - 871
- [3] End-to-end security scheme for mobility enabled healthcare Internet of Things FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
- [4] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT 2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
- [6] A New Security Scheme for E-health System PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 361 - 366
- [7] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [8] Enhanced Security Framework for E-Health Systems using Blockchain JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 239 - 250
- [9] An Approach for End-to-End (E2E) Security of 5G Applications 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 133 - 138
- [10] End-to-End Transport Security in the IP-based Internet of Things 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,