Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("End-to-end security")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 6 of 6

  • Page / 1
Export

Selection :

  • and

End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture : INCoS-2012WUJUN ZHANG; YUEYU ZHANG; JIE CHEN et al.Cluster computing. 2013, Vol 16, Num 4, pp 861-871, issn 1386-7857, 11 p.Article

An efficient identity-based cryptosystem for end-to-end mobile securityHWU, Jing-Shyang; CHEN, Rong-Jaye; LIN, Yi-Bing et al.IEEE transactions on wireless communications. 2006, Vol 5, Num 9, pp 2586-2593, issn 1536-1276, 8 p.Article

Secure performance enhancing proxy : To ensure end-to-end security and enhance TCP performance over IPv6 wireless networksOBANAIK, Venkatesh; JACOB, Lillykutty; ANANDA, A. L et al.Computer networks (1999). 2006, Vol 50, Num 13, pp 2225-2238, issn 1389-1286, 14 p.Article

Adaptation-aware encryption of scalable H.264/AVC video for content securityKODIKARA ARACHCHI, H; PERRAMON, X; DOGAN, S et al.Signal processing. Image communication. 2009, Vol 24, Num 6, pp 468-483, issn 0923-5965, 16 p.Article

Lightweight collaborative key establishment scheme for the Internet of ThingsBEN SAIED, Yosra; OLIVEREAU, Alexis; ZEGHLACHE, Djamal et al.Computer networks (1999). 2014, Vol 64, pp 273-295, issn 1389-1286, 23 p.Article

An efficient end-to-end security mechanism for IP multimedia subsystemCHEN, Chi-Yuan; WU, Tin-Yu; HUANG, Yueh-Min et al.Computer communications. 2008, Vol 31, Num 18, pp 4259-4268, issn 0140-3664, 10 p.Article

  • Page / 1