Статті в журналах з теми "END TO END SECURED"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "END TO END SECURED".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Goel, Nidhi, Balasubramanian Raman, and Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems." Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Повний текст джерелаLogunleko, Abolore Muhamin, Kolawole Bariu Logunleko, and Olanrewaju Olaide Lawal. "An End-to-End Secured Email System using Base64 Algorithm." International Journal of Computer Applications 175, no. 28 (October 28, 2020): 1–6. http://dx.doi.org/10.5120/ijca2020920669.
Повний текст джерелаChalouf, M. A., and F. Krief. "A secured, automated, and dynamic end-to-end service level negotiation." Concurrency and Computation: Practice and Experience 25, no. 2 (January 18, 2012): 180–202. http://dx.doi.org/10.1002/cpe.2806.
Повний текст джерелаMathur, Avijit, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly, and Daniel Toal. "A secure end-to-end IoT solution." Sensors and Actuators A: Physical 263 (August 2017): 291–99. http://dx.doi.org/10.1016/j.sna.2017.06.019.
Повний текст джерелаSwati Salunkhe et al. "Advanced End-to-End Image Encryption and Compression." Proceeding International Conference on Science and Engineering 11, no. 1 (February 18, 2023): 282–90. http://dx.doi.org/10.52783/cienceng.v11i1.125.
Повний текст джерелаGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Mathieu. "Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors." IEEE Design & Test of Computers 24, no. 6 (November 2007): 546–55. http://dx.doi.org/10.1109/mdt.2007.202.
Повний текст джерелаGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Matheiu. "Secured CAD back-end flow for power-analysis resistant cryptoprocessors." IEEE Design & Test of Computers 24, no. 99 (2007): x2. http://dx.doi.org/10.1109/mdt.2007.4343579.
Повний текст джерелаHardjono, Thomas, and Tadashi Ohta. "Secure end-to-end delegations in distributed systems." Computer Communications 17, no. 3 (March 1994): 230–38. http://dx.doi.org/10.1016/0140-3664(94)90008-6.
Повний текст джерелаPramukantoro, Eko Sakti, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, and Deny Hari Prasetya Dewa. "Implementasi Mekanisme End-To-End Security pada IoT Middleware." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (May 9, 2019): 335. http://dx.doi.org/10.25126/jtiik.2019631401.
Повний текст джерелаAhmad, Mudassar, Majid Hussain, Beenish Abbas, Omar Aldabbas, Uzma Jamil, Rehan Ashraf, and Shahla Asadi. "End-to-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises." IEEE Access 6 (2018): 11641–56. http://dx.doi.org/10.1109/access.2018.2802841.
Повний текст джерелаSisodia, Omkar, Priyanka Bade, Pujari Ashwini, Mayuri Ambekar, and Prof Shiv Shinde. "Event Management using End-to-End Image Encryption: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3462–66. http://dx.doi.org/10.22214/ijraset.2022.43298.
Повний текст джерелаA.El Zouka, Heshem. "Providing End-To-End Secure Communications in GSM Networks." International Journal of Network Security & Its Applications 7, no. 4 (July 30, 2015): 31–41. http://dx.doi.org/10.5121/ijnsa.2015.7402.
Повний текст джерелаShakiba, Nafise Mohammadi, Mohammad-Ali Doostari, and Mostafa Mohammadpourfard. "ESIV: an end-to-end secure internet voting system." Electronic Commerce Research 17, no. 3 (July 8, 2016): 463–94. http://dx.doi.org/10.1007/s10660-016-9230-y.
Повний текст джерелаLo, Johnny Li-Chang, Judith Bishop, and J. H. P. Eloff. "SMSSec: An end-to-end protocol for secure SMS." Computers & Security 27, no. 5-6 (October 2008): 154–67. http://dx.doi.org/10.1016/j.cose.2008.05.003.
Повний текст джерелаWeliwita, Chathurika. "Performance Study on 5G - NSA Backhaul Network Secured with HIP." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5705–16. http://dx.doi.org/10.35444/ijana.2023.14607.
Повний текст джерелаBhuse, Vijay. "Review of End-to-End Encryption for Social Media." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 35–37. http://dx.doi.org/10.34190/iccws.18.1.1017.
Повний текст джерелаSu, Yan, and Zhi Xing Huang. "Research on End-To-End SMS Confidential Communication System." Applied Mechanics and Materials 336-338 (July 2013): 1744–47. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1744.
Повний текст джерелаSu, Yanhong, and Lijing Yu. "Security System of Logistics Service Transaction Record Based on Wireless Network." Mobile Information Systems 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/8141190.
Повний текст джерелаCui, Li, Xing Qianqian, Wang Yi, Wang Baosheng, Tao Jing, and Liu Liu. "FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT." Security and Communication Networks 2022 (August 8, 2022): 1–18. http://dx.doi.org/10.1155/2022/2644716.
Повний текст джерелаMousa, Salman, and M. A. El-dosuky. "End-To-End Secure Communication using Encryption and Fingerprint Recognition." International Journal of Computer Applications 184, no. 31 (October 20, 2022): 26–29. http://dx.doi.org/10.5120/ijca2022922377.
Повний текст джерелаGu, Wenjun, Neelanjana Dutta, Sriram Chellappan, and Xiaole Bai. "Providing End-to-End Secure Communications in Wireless Sensor Networks." IEEE Transactions on Network and Service Management 8, no. 3 (September 2011): 205–18. http://dx.doi.org/10.1109/tnsm.2011.072611.100080.
Повний текст джерелаSinger, H., M. Yakami, T. Takahashi, and A. Alkhateeb. "An End-to-End Secure Patient Information Access Card System." Methods of Information in Medicine 39, no. 01 (2000): 70–72. http://dx.doi.org/10.1055/s-0038-1634250.
Повний текст джерелаHe, Xiang, and Aylin Yener. "End-to-End Secure Multi-Hop Communication with Untrusted Relays." IEEE Transactions on Wireless Communications 12, no. 1 (January 2013): 1–11. http://dx.doi.org/10.1109/twc.2012.120412.101358.
Повний текст джерелаKartika, Silfani Putri, Andra Arfiandy Jusran, Syifa Herning Fadillah, Zulfany Erlisa Rasjid, Tatang Gunar Setiadji, and Bayu Kanigoro. "End-to-End Secure Protocol Design on Live Messenger Application." Procedia Computer Science 59 (2015): 54–63. http://dx.doi.org/10.1016/j.procs.2015.07.337.
Повний текст джерелаDabideen, Stephen, Bradley R. Smith, and J. J. Garcia-Luna-Aceves. "An end-to-end approach to secure routing in MANETs." Security and Communication Networks 3, no. 2-3 (June 23, 2009): 130–49. http://dx.doi.org/10.1002/sec.121.
Повний текст джерелаBojjagani, Sriramulu, and V. N. Sastry. "A secure end-to-end SMS-based mobile banking protocol." International Journal of Communication Systems 30, no. 15 (February 28, 2017): e3302. http://dx.doi.org/10.1002/dac.3302.
Повний текст джерелаHarshvardhan, Bawake, Cholke Saideep, Dhole Atharv, Jadhav Ankit, and Prof Arti Bhise. "A Secure Messaging Application with Unbreakable End to End Encryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 234–39. http://dx.doi.org/10.22214/ijraset.2023.50805.
Повний текст джерелаGupta, Gauri, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, and Rijurekha Sen. "End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (October 2023): 436–51. http://dx.doi.org/10.56553/popets-2023-0118.
Повний текст джерелаAnjum, Mohd, Sana Shahab, Yang Yu, and Habib Figa Guye. "Identifying Adversary Impact Using End User Verifiable Key with Permutation Framework." Electronics 12, no. 5 (February 26, 2023): 1136. http://dx.doi.org/10.3390/electronics12051136.
Повний текст джерелаAbdullah, Abdullah. "Authenticated and Secure End-To-End Communication Channel Using SMS Messages." AL-Rafidain Journal of Computer Sciences and Mathematics 6, no. 1 (March 1, 2009): 209–22. http://dx.doi.org/10.33899/csmj.2009.163779.
Повний текст джерелаLizardo, André, Raul Barbosa, Samuel Neves, Jaime Correia, and Filipe Araujo. "End-to-end secure group communication for the Internet of Things." Journal of Information Security and Applications 58 (May 2021): 102772. http://dx.doi.org/10.1016/j.jisa.2021.102772.
Повний текст джерелаKim, Ki-Hong. "End-to-End Digital Secure Speech Communication over UHF and PSTN." Journal of the Korea Academia-Industrial cooperation Society 13, no. 5 (May 31, 2012): 2313–18. http://dx.doi.org/10.5762/kais.2012.13.5.2313.
Повний текст джерелаSaxena, Neetesh, and Narendra S. Chaudhari. "EasySMS: A Protocol for End-to-End Secure Transmission of SMS." IEEE Transactions on Information Forensics and Security 9, no. 7 (July 2014): 1157–68. http://dx.doi.org/10.1109/tifs.2014.2320579.
Повний текст джерелаSun, Qibin, John Apostolopoulos, Chang Wen Chen, and Shih-Fu Chang. "Quality-Optimized and Secure End-to-End Authentication for Media Delivery." Proceedings of the IEEE 96, no. 1 (January 2008): 97–111. http://dx.doi.org/10.1109/jproc.2007.909926.
Повний текст джерелаLeBlanc, Karl A., and Zinda Z. LeBlanc. "Gastrointestinal End-to-End Anastomosis Using Staples to Secure The Procedure." AORN Journal 51, no. 4 (April 1990): 986–93. http://dx.doi.org/10.1016/s0001-2092(07)66836-7.
Повний текст джерелаBojjagani, Sriramulu, and V. N. Sastry. "A secure end-to-end proximity NFC-based mobile payment protocol." Computer Standards & Interfaces 66 (October 2019): 103348. http://dx.doi.org/10.1016/j.csi.2019.04.007.
Повний текст джерелаChoi, Jongseok, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, and Howon Kim. "Secure IoT framework and 2D architecture for End-To-End security." Journal of Supercomputing 74, no. 8 (March 2, 2016): 3521–35. http://dx.doi.org/10.1007/s11227-016-1684-0.
Повний текст джерелаLestari, Sundari Putri, Harris Nur Fadlan, Ribka Angelia Purba, and Indra Gunawan. "REALISASI KRIPTOGRAFI PADA FITUR ENKRIPSI END-TO-END PESAN WHATSAPP." Jurnal Media Informatika 4, no. 1 (November 15, 2022): 1–8. http://dx.doi.org/10.55338/jumin.v4i1.423.
Повний текст джерелаKaur, Manjit, Deepak Prashar, Mamoon Rashid, Sultan S. Alshamrani, and Ahmed Saeed AlGhamdi. "A Novel Approach for Securing Nodes Using Two-Ray Model and Shadow Effects in Flying Ad-Hoc Network." Electronics 10, no. 24 (December 19, 2021): 3164. http://dx.doi.org/10.3390/electronics10243164.
Повний текст джерелаRayarikar, Rohan, and Ajinkya Bokil. "An Encryption Algorithm for End-to-End Secure Data Transmission in MANET." International Journal of Computer Applications 56, no. 16 (October 20, 2012): 29–33. http://dx.doi.org/10.5120/8977-3187.
Повний текст джерелаLiu, Qiang, Tao Han, and Nirwan Ansari. "Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems." IEEE Network 34, no. 3 (May 2020): 37–43. http://dx.doi.org/10.1109/mnet.011.1900303.
Повний текст джерелаSun, Zhuo, Hengmiao Wu, Chenglin Zhao, and Gang Yue. "End-to-End Learning of Secure Wireless Communications: Confidential Transmission and Authentication." IEEE Wireless Communications 27, no. 5 (October 2020): 88–95. http://dx.doi.org/10.1109/mwc.001.2000005.
Повний текст джерелаBenslimane, Yamina, and Khelifa BenAhmed. "Efficient End-to-End Secure Key Management Protocol for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3622. http://dx.doi.org/10.11591/ijece.v7i6.pp3622-3631.
Повний текст джерелаAbdmeziem, Mohammed Riyadh, and Djamel Tandjaoui. "An end-to-end secure key management protocol for e-health applications." Computers & Electrical Engineering 44 (May 2015): 184–97. http://dx.doi.org/10.1016/j.compeleceng.2015.03.030.
Повний текст джерелаPark, Cheol-Yong, Ki-Hong Kim, and Jae-Cheol Ryou. "A mechanism for end-to-end secure communication in heterogeneous tactical networks." Journal of the Korea Institute of Information Security and Cryptology 24, no. 4 (August 31, 2014): 625–34. http://dx.doi.org/10.13089/jkiisc.2014.24.4.625.
Повний текст джерелаKhurana, Sandhya, and Neelima Gupta. "End-to-end protocol to secure ad hoc networks against wormhole attacks." Security and Communication Networks 4, no. 9 (January 12, 2011): 994–1002. http://dx.doi.org/10.1002/sec.272.
Повний текст джерелаCakulev, Violeta, Ioannis Broustis, and Ganapathy S. Sundaram. "Secure Enablement of Real Time Applications: A Novel End-to-End Approach." Bell Labs Technical Journal 17, no. 3 (December 2012): 175–91. http://dx.doi.org/10.1002/bltj.21567.
Повний текст джерелаWang, Rui, Qibing Wang, George T. Kanellos, Reza Nejabati, Dimitra Simeonidou, Rodrigo S. Tessinari, Emilio Hugues-Salas, et al. "End-to-End Quantum Secured Inter-Domain 5G Service Orchestration Over Dynamically Switched Flex-Grid Optical Networks Enabled by a q-ROADM." Journal of Lightwave Technology 38, no. 1 (January 1, 2020): 139–49. http://dx.doi.org/10.1109/jlt.2019.2949864.
Повний текст джерелаGuo, Jiang Hong, Jian Qiang Wu, and Xi Hong Wu. "Data Aggregation with End-to-End Security for Wireless Sensor Networks." Advanced Materials Research 490-495 (March 2012): 383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.383.
Повний текст джерелаKodukhov, Aleksei D., Valeria A. Pastushenko, Nikita S. Kirsanov, Dmitry A. Kronberg, Markus Pflitsch, and Valerii M. Vinokur. "Boosting Quantum Key Distribution via the End-to-End Loss Control." Cryptography 7, no. 3 (August 2, 2023): 38. http://dx.doi.org/10.3390/cryptography7030038.
Повний текст джерела