共 50 条
- [1] Traceback for End-to-End Encrypted Messaging PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
- [3] End-to-End Encrypted Messaging Protocols: An Overview INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
- [4] End-to-end Learning for Encrypted Image Retrieval 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
- [5] An end-to-end packet delay optimization for QoS in a MANET Embedded Software and Systems, Proceedings, 2007, 4523 : 653 - 663
- [6] Enhanced Certificate Transparency and End-to-end Encrypted Mail 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [7] Injection Attacks Against End-to-End Encrypted Applications 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2648 - 2665
- [8] A Formal Treatment of End-to-End Encrypted Cloud Storage ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 40 - 74
- [9] Voice End-to-End Encrypted for TETRA Radiocommunication System PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
- [10] Snake: an End-to-End Encrypted Online Social Network 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770