共 50 条
- [31] Synthesising End-to-End Security Protocols 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
- [32] End-to-End Security for Personal Telehealth USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
- [33] End-to-End Security for Enterprise Mashups SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
- [34] End-to-end security for GSM users 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
- [35] Performance Evaluation on End-to-End Security Architecture for Mobile Banking System 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 445 - +
- [36] End-to-end Java security performance enhancements for oracle SPARC servers ICPE - Proc. ACM/SPEC Int. Conf. Perform. Eng., (159-166):
- [37] End-to-end integrated security and performance analysis on the DEGAS choreographer platform FM 2005: FORMAL METHODS, PROCEEDINGS, 2005, 3582 : 286 - 301
- [39] Performance evaluation of an end-to-end rate control approach for ABR services IEICE Trans Commun, 12 (2400-2412):
- [40] Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,