kw.\*:("End-to-end security")
Results 1 to 6 of 6
Selection :
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture : INCoS-2012WUJUN ZHANG; YUEYU ZHANG; JIE CHEN et al.Cluster computing. 2013, Vol 16, Num 4, pp 861-871, issn 1386-7857, 11 p.Article
An efficient identity-based cryptosystem for end-to-end mobile securityHWU, Jing-Shyang; CHEN, Rong-Jaye; LIN, Yi-Bing et al.IEEE transactions on wireless communications. 2006, Vol 5, Num 9, pp 2586-2593, issn 1536-1276, 8 p.Article
Secure performance enhancing proxy : To ensure end-to-end security and enhance TCP performance over IPv6 wireless networksOBANAIK, Venkatesh; JACOB, Lillykutty; ANANDA, A. L et al.Computer networks (1999). 2006, Vol 50, Num 13, pp 2225-2238, issn 1389-1286, 14 p.Article
Adaptation-aware encryption of scalable H.264/AVC video for content securityKODIKARA ARACHCHI, H; PERRAMON, X; DOGAN, S et al.Signal processing. Image communication. 2009, Vol 24, Num 6, pp 468-483, issn 0923-5965, 16 p.Article
Lightweight collaborative key establishment scheme for the Internet of ThingsBEN SAIED, Yosra; OLIVEREAU, Alexis; ZEGHLACHE, Djamal et al.Computer networks (1999). 2014, Vol 64, pp 273-295, issn 1389-1286, 23 p.Article
An efficient end-to-end security mechanism for IP multimedia subsystemCHEN, Chi-Yuan; WU, Tin-Yu; HUANG, Yueh-Min et al.Computer communications. 2008, Vol 31, Num 18, pp 4259-4268, issn 0140-3664, 10 p.Article