共 50 条
- [21] Extensible and Realistic Modeling of Resource Contention in Resource-Constrained Nodes 2013 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2013, : 1 - 9
- [22] Cryptography for Privacy in a Resource-Constrained IoT: A Systematic Literature Review IEIE Transactions on Smart Processing and Computing, 2022, 11 (05): : 351 - 360
- [25] Optimizing Cryptography Execution On Resource-Constrained Hardware Through Algorithm Integration SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 1, SMARTCOM 2024, 2024, 945 : 371 - 382
- [26] Approaches to Efficient Resource-Constrained Project Rescheduling STAIRS 2006, 2006, 142 : 208 - 219
- [27] CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 3 - 25
- [28] Lightweight Blockchain for Authentication and Authorization in Resource-Constrained IoT Networks IEEE ACCESS, 2025, 13 : 48047 - 48067