Artículos de revistas sobre el tema "END TO END SECURED"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "END TO END SECURED".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Goel, Nidhi, Balasubramanian Raman y Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems". Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Texto completoLogunleko, Abolore Muhamin, Kolawole Bariu Logunleko y Olanrewaju Olaide Lawal. "An End-to-End Secured Email System using Base64 Algorithm". International Journal of Computer Applications 175, n.º 28 (28 de octubre de 2020): 1–6. http://dx.doi.org/10.5120/ijca2020920669.
Texto completoChalouf, M. A. y F. Krief. "A secured, automated, and dynamic end-to-end service level negotiation". Concurrency and Computation: Practice and Experience 25, n.º 2 (18 de enero de 2012): 180–202. http://dx.doi.org/10.1002/cpe.2806.
Texto completoMathur, Avijit, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly y Daniel Toal. "A secure end-to-end IoT solution". Sensors and Actuators A: Physical 263 (agosto de 2017): 291–99. http://dx.doi.org/10.1016/j.sna.2017.06.019.
Texto completoSwati Salunkhe et al. "Advanced End-to-End Image Encryption and Compression". Proceeding International Conference on Science and Engineering 11, n.º 1 (18 de febrero de 2023): 282–90. http://dx.doi.org/10.52783/cienceng.v11i1.125.
Texto completoGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet y Yves Mathieu. "Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors". IEEE Design & Test of Computers 24, n.º 6 (noviembre de 2007): 546–55. http://dx.doi.org/10.1109/mdt.2007.202.
Texto completoGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet y Yves Matheiu. "Secured CAD back-end flow for power-analysis resistant cryptoprocessors". IEEE Design & Test of Computers 24, n.º 99 (2007): x2. http://dx.doi.org/10.1109/mdt.2007.4343579.
Texto completoHardjono, Thomas y Tadashi Ohta. "Secure end-to-end delegations in distributed systems". Computer Communications 17, n.º 3 (marzo de 1994): 230–38. http://dx.doi.org/10.1016/0140-3664(94)90008-6.
Texto completoPramukantoro, Eko Sakti, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji y Deny Hari Prasetya Dewa. "Implementasi Mekanisme End-To-End Security pada IoT Middleware". Jurnal Teknologi Informasi dan Ilmu Komputer 6, n.º 3 (9 de mayo de 2019): 335. http://dx.doi.org/10.25126/jtiik.2019631401.
Texto completoAhmad, Mudassar, Majid Hussain, Beenish Abbas, Omar Aldabbas, Uzma Jamil, Rehan Ashraf y Shahla Asadi. "End-to-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises". IEEE Access 6 (2018): 11641–56. http://dx.doi.org/10.1109/access.2018.2802841.
Texto completoSisodia, Omkar, Priyanka Bade, Pujari Ashwini, Mayuri Ambekar y Prof Shiv Shinde. "Event Management using End-to-End Image Encryption: A Review". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de mayo de 2022): 3462–66. http://dx.doi.org/10.22214/ijraset.2022.43298.
Texto completoA.El Zouka, Heshem. "Providing End-To-End Secure Communications in GSM Networks". International Journal of Network Security & Its Applications 7, n.º 4 (30 de julio de 2015): 31–41. http://dx.doi.org/10.5121/ijnsa.2015.7402.
Texto completoShakiba, Nafise Mohammadi, Mohammad-Ali Doostari y Mostafa Mohammadpourfard. "ESIV: an end-to-end secure internet voting system". Electronic Commerce Research 17, n.º 3 (8 de julio de 2016): 463–94. http://dx.doi.org/10.1007/s10660-016-9230-y.
Texto completoLo, Johnny Li-Chang, Judith Bishop y J. H. P. Eloff. "SMSSec: An end-to-end protocol for secure SMS". Computers & Security 27, n.º 5-6 (octubre de 2008): 154–67. http://dx.doi.org/10.1016/j.cose.2008.05.003.
Texto completoWeliwita, Chathurika. "Performance Study on 5G - NSA Backhaul Network Secured with HIP". International Journal of Advanced Networking and Applications 14, n.º 06 (2023): 5705–16. http://dx.doi.org/10.35444/ijana.2023.14607.
Texto completoBhuse, Vijay. "Review of End-to-End Encryption for Social Media". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de febrero de 2023): 35–37. http://dx.doi.org/10.34190/iccws.18.1.1017.
Texto completoSu, Yan y Zhi Xing Huang. "Research on End-To-End SMS Confidential Communication System". Applied Mechanics and Materials 336-338 (julio de 2013): 1744–47. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1744.
Texto completoSu, Yanhong y Lijing Yu. "Security System of Logistics Service Transaction Record Based on Wireless Network". Mobile Information Systems 2022 (1 de septiembre de 2022): 1–12. http://dx.doi.org/10.1155/2022/8141190.
Texto completoCui, Li, Xing Qianqian, Wang Yi, Wang Baosheng, Tao Jing y Liu Liu. "FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT". Security and Communication Networks 2022 (8 de agosto de 2022): 1–18. http://dx.doi.org/10.1155/2022/2644716.
Texto completoMousa, Salman y M. A. El-dosuky. "End-To-End Secure Communication using Encryption and Fingerprint Recognition". International Journal of Computer Applications 184, n.º 31 (20 de octubre de 2022): 26–29. http://dx.doi.org/10.5120/ijca2022922377.
Texto completoGu, Wenjun, Neelanjana Dutta, Sriram Chellappan y Xiaole Bai. "Providing End-to-End Secure Communications in Wireless Sensor Networks". IEEE Transactions on Network and Service Management 8, n.º 3 (septiembre de 2011): 205–18. http://dx.doi.org/10.1109/tnsm.2011.072611.100080.
Texto completoSinger, H., M. Yakami, T. Takahashi y A. Alkhateeb. "An End-to-End Secure Patient Information Access Card System". Methods of Information in Medicine 39, n.º 01 (2000): 70–72. http://dx.doi.org/10.1055/s-0038-1634250.
Texto completoHe, Xiang y Aylin Yener. "End-to-End Secure Multi-Hop Communication with Untrusted Relays". IEEE Transactions on Wireless Communications 12, n.º 1 (enero de 2013): 1–11. http://dx.doi.org/10.1109/twc.2012.120412.101358.
Texto completoKartika, Silfani Putri, Andra Arfiandy Jusran, Syifa Herning Fadillah, Zulfany Erlisa Rasjid, Tatang Gunar Setiadji y Bayu Kanigoro. "End-to-End Secure Protocol Design on Live Messenger Application". Procedia Computer Science 59 (2015): 54–63. http://dx.doi.org/10.1016/j.procs.2015.07.337.
Texto completoDabideen, Stephen, Bradley R. Smith y J. J. Garcia-Luna-Aceves. "An end-to-end approach to secure routing in MANETs". Security and Communication Networks 3, n.º 2-3 (23 de junio de 2009): 130–49. http://dx.doi.org/10.1002/sec.121.
Texto completoBojjagani, Sriramulu y V. N. Sastry. "A secure end-to-end SMS-based mobile banking protocol". International Journal of Communication Systems 30, n.º 15 (28 de febrero de 2017): e3302. http://dx.doi.org/10.1002/dac.3302.
Texto completoHarshvardhan, Bawake, Cholke Saideep, Dhole Atharv, Jadhav Ankit y Prof Arti Bhise. "A Secure Messaging Application with Unbreakable End to End Encryption". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 234–39. http://dx.doi.org/10.22214/ijraset.2023.50805.
Texto completoGupta, Gauri, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran y Rijurekha Sen. "End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets". Proceedings on Privacy Enhancing Technologies 2023, n.º 4 (octubre de 2023): 436–51. http://dx.doi.org/10.56553/popets-2023-0118.
Texto completoAnjum, Mohd, Sana Shahab, Yang Yu y Habib Figa Guye. "Identifying Adversary Impact Using End User Verifiable Key with Permutation Framework". Electronics 12, n.º 5 (26 de febrero de 2023): 1136. http://dx.doi.org/10.3390/electronics12051136.
Texto completoAbdullah, Abdullah. "Authenticated and Secure End-To-End Communication Channel Using SMS Messages". AL-Rafidain Journal of Computer Sciences and Mathematics 6, n.º 1 (1 de marzo de 2009): 209–22. http://dx.doi.org/10.33899/csmj.2009.163779.
Texto completoLizardo, André, Raul Barbosa, Samuel Neves, Jaime Correia y Filipe Araujo. "End-to-end secure group communication for the Internet of Things". Journal of Information Security and Applications 58 (mayo de 2021): 102772. http://dx.doi.org/10.1016/j.jisa.2021.102772.
Texto completoKim, Ki-Hong. "End-to-End Digital Secure Speech Communication over UHF and PSTN". Journal of the Korea Academia-Industrial cooperation Society 13, n.º 5 (31 de mayo de 2012): 2313–18. http://dx.doi.org/10.5762/kais.2012.13.5.2313.
Texto completoSaxena, Neetesh y Narendra S. Chaudhari. "EasySMS: A Protocol for End-to-End Secure Transmission of SMS". IEEE Transactions on Information Forensics and Security 9, n.º 7 (julio de 2014): 1157–68. http://dx.doi.org/10.1109/tifs.2014.2320579.
Texto completoSun, Qibin, John Apostolopoulos, Chang Wen Chen y Shih-Fu Chang. "Quality-Optimized and Secure End-to-End Authentication for Media Delivery". Proceedings of the IEEE 96, n.º 1 (enero de 2008): 97–111. http://dx.doi.org/10.1109/jproc.2007.909926.
Texto completoLeBlanc, Karl A. y Zinda Z. LeBlanc. "Gastrointestinal End-to-End Anastomosis Using Staples to Secure The Procedure". AORN Journal 51, n.º 4 (abril de 1990): 986–93. http://dx.doi.org/10.1016/s0001-2092(07)66836-7.
Texto completoBojjagani, Sriramulu y V. N. Sastry. "A secure end-to-end proximity NFC-based mobile payment protocol". Computer Standards & Interfaces 66 (octubre de 2019): 103348. http://dx.doi.org/10.1016/j.csi.2019.04.007.
Texto completoChoi, Jongseok, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo y Howon Kim. "Secure IoT framework and 2D architecture for End-To-End security". Journal of Supercomputing 74, n.º 8 (2 de marzo de 2016): 3521–35. http://dx.doi.org/10.1007/s11227-016-1684-0.
Texto completoLestari, Sundari Putri, Harris Nur Fadlan, Ribka Angelia Purba y Indra Gunawan. "REALISASI KRIPTOGRAFI PADA FITUR ENKRIPSI END-TO-END PESAN WHATSAPP". Jurnal Media Informatika 4, n.º 1 (15 de noviembre de 2022): 1–8. http://dx.doi.org/10.55338/jumin.v4i1.423.
Texto completoKaur, Manjit, Deepak Prashar, Mamoon Rashid, Sultan S. Alshamrani y Ahmed Saeed AlGhamdi. "A Novel Approach for Securing Nodes Using Two-Ray Model and Shadow Effects in Flying Ad-Hoc Network". Electronics 10, n.º 24 (19 de diciembre de 2021): 3164. http://dx.doi.org/10.3390/electronics10243164.
Texto completoRayarikar, Rohan y Ajinkya Bokil. "An Encryption Algorithm for End-to-End Secure Data Transmission in MANET". International Journal of Computer Applications 56, n.º 16 (20 de octubre de 2012): 29–33. http://dx.doi.org/10.5120/8977-3187.
Texto completoLiu, Qiang, Tao Han y Nirwan Ansari. "Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems". IEEE Network 34, n.º 3 (mayo de 2020): 37–43. http://dx.doi.org/10.1109/mnet.011.1900303.
Texto completoSun, Zhuo, Hengmiao Wu, Chenglin Zhao y Gang Yue. "End-to-End Learning of Secure Wireless Communications: Confidential Transmission and Authentication". IEEE Wireless Communications 27, n.º 5 (octubre de 2020): 88–95. http://dx.doi.org/10.1109/mwc.001.2000005.
Texto completoBenslimane, Yamina y Khelifa BenAhmed. "Efficient End-to-End Secure Key Management Protocol for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 7, n.º 6 (1 de diciembre de 2017): 3622. http://dx.doi.org/10.11591/ijece.v7i6.pp3622-3631.
Texto completoAbdmeziem, Mohammed Riyadh y Djamel Tandjaoui. "An end-to-end secure key management protocol for e-health applications". Computers & Electrical Engineering 44 (mayo de 2015): 184–97. http://dx.doi.org/10.1016/j.compeleceng.2015.03.030.
Texto completoPark, Cheol-Yong, Ki-Hong Kim y Jae-Cheol Ryou. "A mechanism for end-to-end secure communication in heterogeneous tactical networks". Journal of the Korea Institute of Information Security and Cryptology 24, n.º 4 (31 de agosto de 2014): 625–34. http://dx.doi.org/10.13089/jkiisc.2014.24.4.625.
Texto completoKhurana, Sandhya y Neelima Gupta. "End-to-end protocol to secure ad hoc networks against wormhole attacks". Security and Communication Networks 4, n.º 9 (12 de enero de 2011): 994–1002. http://dx.doi.org/10.1002/sec.272.
Texto completoCakulev, Violeta, Ioannis Broustis y Ganapathy S. Sundaram. "Secure Enablement of Real Time Applications: A Novel End-to-End Approach". Bell Labs Technical Journal 17, n.º 3 (diciembre de 2012): 175–91. http://dx.doi.org/10.1002/bltj.21567.
Texto completoWang, Rui, Qibing Wang, George T. Kanellos, Reza Nejabati, Dimitra Simeonidou, Rodrigo S. Tessinari, Emilio Hugues-Salas et al. "End-to-End Quantum Secured Inter-Domain 5G Service Orchestration Over Dynamically Switched Flex-Grid Optical Networks Enabled by a q-ROADM". Journal of Lightwave Technology 38, n.º 1 (1 de enero de 2020): 139–49. http://dx.doi.org/10.1109/jlt.2019.2949864.
Texto completoGuo, Jiang Hong, Jian Qiang Wu y Xi Hong Wu. "Data Aggregation with End-to-End Security for Wireless Sensor Networks". Advanced Materials Research 490-495 (marzo de 2012): 383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.383.
Texto completoKodukhov, Aleksei D., Valeria A. Pastushenko, Nikita S. Kirsanov, Dmitry A. Kronberg, Markus Pflitsch y Valerii M. Vinokur. "Boosting Quantum Key Distribution via the End-to-End Loss Control". Cryptography 7, n.º 3 (2 de agosto de 2023): 38. http://dx.doi.org/10.3390/cryptography7030038.
Texto completo