Amanote Research

Amanote Research

    RegisterSign In

On Track of Sigfox Confidentiality With End-To-End Encryption

doi 10.1145/3230833.3232805
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2018

Authors
Radek FujdiakPetr BlazekKonstantin MikhaylovLukas MalinaPetr MlynekJiri MisurecVojtech Blazek
Publisher

ACM Press


Related search

Design of Secure Chatting Application With End to End Encryption for Android Platform

Iraqi Journal for Computers and Informatics
2017English

Key Management for Large Scale End-To-End Encryption

1994English

An Encryption Algorithm for End-To-End Secure Data Transmission in MANET

International Journal of Computer Applications
2012English

End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

IEEE Signal Processing Magazine
Electronic EngineeringApplied MathematicsElectricalMusicSignal Processing
2013English

E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks

Int'l J. of Communications, Network and System Sciences
2012English

Satisfying End-To-End Quality of Service Requirements With End-To-End Performance Inference Technique

English

On End-To-End QOS Mapping

1997English

Bezbednosni Mehanizam Za Prenos I Skladištenje Podataka U Oblaku / Security Mechanism for Cloud End-To-End Encryption

ZBORNIK RADOVA UNIVERZITETA SINERGIJA
2016English

Research on End to End Performance Testing of Web Applications

International Journal of Advanced Research in Computer Science and Software Engineering
2017English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy