Academic literature on the topic 'END TO END SECURED'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'END TO END SECURED.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "END TO END SECURED"
Goel, Nidhi, Balasubramanian Raman, and Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems." Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Full textLogunleko, Abolore Muhamin, Kolawole Bariu Logunleko, and Olanrewaju Olaide Lawal. "An End-to-End Secured Email System using Base64 Algorithm." International Journal of Computer Applications 175, no. 28 (2020): 1–6. http://dx.doi.org/10.5120/ijca2020920669.
Full textChalouf, M. A., and F. Krief. "A secured, automated, and dynamic end-to-end service level negotiation." Concurrency and Computation: Practice and Experience 25, no. 2 (2012): 180–202. http://dx.doi.org/10.1002/cpe.2806.
Full textMathur, Avijit, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly, and Daniel Toal. "A secure end-to-end IoT solution." Sensors and Actuators A: Physical 263 (August 2017): 291–99. http://dx.doi.org/10.1016/j.sna.2017.06.019.
Full textSwati Salunkhe et al. "Advanced End-to-End Image Encryption and Compression." Proceeding International Conference on Science and Engineering 11, no. 1 (2023): 282–90. http://dx.doi.org/10.52783/cienceng.v11i1.125.
Full textGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Mathieu. "Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors." IEEE Design & Test of Computers 24, no. 6 (2007): 546–55. http://dx.doi.org/10.1109/mdt.2007.202.
Full textGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Matheiu. "Secured CAD back-end flow for power-analysis resistant cryptoprocessors." IEEE Design & Test of Computers 24, no. 99 (2007): x2. http://dx.doi.org/10.1109/mdt.2007.4343579.
Full textHardjono, Thomas, and Tadashi Ohta. "Secure end-to-end delegations in distributed systems." Computer Communications 17, no. 3 (1994): 230–38. http://dx.doi.org/10.1016/0140-3664(94)90008-6.
Full textPramukantoro, Eko Sakti, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, and Deny Hari Prasetya Dewa. "Implementasi Mekanisme End-To-End Security pada IoT Middleware." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (2019): 335. http://dx.doi.org/10.25126/jtiik.2019631401.
Full textAhmad, Mudassar, Majid Hussain, Beenish Abbas, et al. "End-to-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises." IEEE Access 6 (2018): 11641–56. http://dx.doi.org/10.1109/access.2018.2802841.
Full textDissertations / Theses on the topic "END TO END SECURED"
Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.
Full textTahir, Ruhma. "An ICMetric based framework for secure end-to-end communication." Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22281/.
Full textVogt, Christian. "Efficient and Secure End-to-End Mobility Support in IPv6." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007211.
Full textNemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Full textSchmidt, Dawin. "A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196360.
Full textVogt, Christian [Verfasser]. "Efficient and Secure End-to-End Mobility Support in IPv6 / Christian Vogt." Aachen : Shaker, 2007. http://d-nb.info/1164340271/34.
Full textUnurkhaan, Esbold. "Secure end-to-end transport over SCTP a new security extension for SCTP /." [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=975686569.
Full textKühner, Holger [Verfasser], and H. [Akademischer Betreuer] Hartenstein. "Performance of End-to-End Secure Data Sharing / Holger Kühner ; Betreuer: H. Hartenstein." Karlsruhe : KIT-Bibliothek, 2017. http://d-nb.info/1132997763/34.
Full textChan, Siu Ping. "End-to-end streaming protocols with QoS control for secure IP multimedia communications /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHAN.
Full textSeggelmann, Robin [Verfasser], Erwin P. [Akademischer Betreuer] Rathgeb, and Bruno [Akademischer Betreuer] Müller-Clostermann. "SCTP : Strategies to Secure End-To-End Communication / Robin Seggelmann. Gutachter: Bruno Müller-Clostermann. Betreuer: Erwin P. Rathgeb." Duisburg, 2013. http://d-nb.info/1030475571/34.
Full textBooks on the topic "END TO END SECURED"
Delusions of intelligence: Enigma, Ultra and the end of secure ciphers. Cambridge University Press, 2006.
Find full textKeith, Hollihan, ed. The end of energy obesity: Breaking today's energy addiction for a prosperous and secure tomorrow. John Wiley & Sons, 2009.
Find full textMoney for life: The "money makeover" that will end your worries and secure your dreams. Simon & Schuster, 1991.
Find full textBergsmann, Stefan. End-to-End-Geschäftsprozessmanagement. Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0840-6.
Full textBook chapters on the topic "END TO END SECURED"
Guo, Dapeng, Melody Moh, and Teng-Sheng Moh. "End-to-End Learning for Autonomous Driving in Secured Smart Cities." In Data-Driven Mining, Learning and Analytics for Secured Smart Cities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72139-8_11.
Full textBitzer, Wolfgang. "Geräte für die End-zu-Ende-Verschlüsselung." In Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/978-3-642-85103-2_8.
Full textHohendorf, Carsten, Erwin P. Rathgeb, Esbold Unurkhaan, and Michael Tüxen. "Secure End-to-End Transport over SCTP." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11766155_27.
Full textCanetti, Ran, Palak Jain, Marika Swanberg, and Mayank Varia. "Universally Composable End-to-End Secure Messaging." In Advances in Cryptology – CRYPTO 2022. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15979-4_1.
Full textSousa, Patrícia R., João S. Resende, Rolando Martins, and Luís Antunes. "Secure Provisioning for Achieving End-to-End Secure Communications." In Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_34.
Full textSingh, Basudeo, and K. S. Jasmine. "Secure End-To-End Authentication for Mobile Banking." In Software Engineering in Intelligent Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18473-9_22.
Full textCastiglione, A., G. Cattaneo, A. De Santis, F. Petagna, and U. Ferraro Petrillo. "SPEECH: Secure Personal End-to-End Communication with Handheld." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_31.
Full textEtemad, Mohammad, and Alptekin Küpçü. "Efficient Key Authentication Service for Secure End-to-End Communications." In Provable Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_10.
Full textVaradharajan, V., and Y. Mu. "Design of Secure End-to-End Protocols for Mobile Systems." In Mobile Communications. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34980-0_26.
Full textAkram, Raja Naeem, and Ryan K. L. Ko. "End-to-End Secure and Privacy Preserving Mobile Chat Application." In Information Security Theory and Practice. Securing the Internet of Things. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43826-8_9.
Full textConference papers on the topic "END TO END SECURED"
Awad, Mohammed, and Ernst L. Leiss. "End-to-End cryptographic voting: Potentials and limitations." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750173.
Full textPatgiri, Ripon, and Naresh Babu Muppalaneni. "Stealth: A Highly Secured End-to-End Symmetric Communication Protocol." In 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2022. http://dx.doi.org/10.1109/isncc55209.2022.9851810.
Full textSchillinger, Fabian, and Christian Schindelhauer. "Partitioned Private User Storages in End-to-End Encrypted Online Social Networks." In 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2020. http://dx.doi.org/10.23919/icitst51030.2020.9351335.
Full textLegrand, W. "Interoperability issues for end to end security: the IP Federating Network (IPFN) for digital secured mobile networks." In IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IEE, 2003. http://dx.doi.org/10.1049/ic:20030025.
Full textWinderickx, Jori, Dave Singelee, and Nele Mentens. "HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing." In 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2018. http://dx.doi.org/10.1109/ccnc.2018.8319245.
Full textBhashini, K. Priya, K. Nalini, and Ponnam Lalitha. "An End-to-End secured Blockchain framework for Internet of Things based smart Healthcare." In 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2023. http://dx.doi.org/10.1109/icecct56650.2023.10179650.
Full textSalant, Eliot, and Gidon Gershinsky. "End-to-end secure insurance telematics." In SYSTOR '19: The 12th ACM International Systems and Storage Conference. ACM, 2019. http://dx.doi.org/10.1145/3319647.3326466.
Full textChowdhury, Fahim Shahriar, Asif Istiaque, Adil Mahmud, and Mohammad Miskat. "An implementation of a lightweight end-to-end secured communication system for patient monitoring system." In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). IEEE, 2018. http://dx.doi.org/10.1109/edct.2018.8405076.
Full textZhu, Qingcheng, Xiaosong Yu, Zihao Wang, Yongli Zhao, and Jie Zhang. "Demonstration of Autonomic End-to-End QoS Assurance over SDN-based QKD-Secured Optical Networks." In 2023 Opto-Electronics and Communications Conference (OECC). IEEE, 2023. http://dx.doi.org/10.1109/oecc56963.2023.10209908.
Full textNguyen, T. N. T., P. Shum, and E. H. Chua. "Secure end-to-end mobile payment system." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207231.
Full textReports on the topic "END TO END SECURED"
Chari, Suresh. MONTAGE: A Methodology for Designing Composable End-to-End Secure Distributed Systems. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada563359.
Full textHunt, Will, and Remco Zwetsloot. The Chipmakers: U.S. Strengths and Priorities for the High-End Semiconductor Workforce. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20190035.
Full textMarshak, Ronni. End-to-End Customer Experience. Patricia Seybold Group, 2011. http://dx.doi.org/10.1571/psgp02-10-11cc.
Full textBest, Jeremy. End to End Weapons Engineering. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1711352.
Full textMalis, A. G. PSN End-to-End functional specification. RFC Editor, 1986. http://dx.doi.org/10.17487/rfc0979.
Full textMathews, A., T. Kwan, K. Buescher, C. Snell, and K. Adams. End-to-End Radiographic Systems Simulation. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/759186.
Full textMontenegro, G., and M. Borella. RSIP Support for End-to-end IPsec. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3104.
Full textMiller, Jonah. End-to-End Modeling of a Kilonova. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1818091.
Full textDawkins, S., G. Montenegro, M. Kojo, and V. Magret. End-to-end Performance Implications of Slow Links. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3150.
Full textMalas, D., and A. Morton. Basic Telephony SIP End-to-End Performance Metrics. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6076.
Full text