共 20 条
- [1] Eslami M, 2017, IEEE INT CONF BIG DA, P4741, DOI 10.1109/BigData.2017.8258527
- [2] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
- [3] Haynberg R., 2013, 2013 INT C SEC CRYPT, P1
- [4] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
- [5] Klisowski Michal, 2010, Proceedings 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010), P303
- [7] Leicht L., 2017, IEEE T BIOMED CIRC S, P1
- [8] Mittenthal L, 2007, LECT NOTES COMPUT SC, V4893, P70
- [9] Nanda A., 2018, IEEE CONSUMER ELECT
- [10] OBAIDAT M.S., 2007, Security of e-systems and computer networks