共 50 条
- [23] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
- [24] An end-to-end QoS and security joint management for IPTV service delivery Chalouf, M.A. (chalouf@labri.fr), 1600, Inderscience Enterprises Ltd. (05): : 398 - 416
- [27] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114
- [28] End-to-End Policy Monitoring and Enforcement for Service-Oriented Architecture 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 58 - 65
- [29] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260
- [30] Investigating End-to-End Security in the Fifth Generation Wireless Capabilities and IoT Extensions CYBER SENSING 2016, 2016, 9826