共 28 条
[1]
[Anonymous], 2017, FREE OP SOURC SOFTW
[2]
Ashton K., 2009, RFID J, V22, P97
[3]
The SIMON and SPECK lightweight block ciphers
[J].
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2015,
[4]
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[5]
Bosch Robert., 1991, Can specification version 2.0, P72
[6]
Carratu M., 2018, Journal of Physics: Conference Series, V1065, DOI 10.1088/1742-6596/1065/19/192004
[7]
Casino M, 2019, 2019 4TH INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS 2019), P136, DOI [10.1109/ICSRS48664.2019.8987605, 10.1109/icsrs48664.2019.8987605]
[8]
Castiglione Arcangelo, 2016, Information Security and Privacy. 21st Australasian Conference, ACISP 2016. Proceedings: LNCS 9723, P37, DOI 10.1007/978-3-319-40367-0_3
[9]
Castiglione A, 2019, 2019 4TH INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS 2019), P142, DOI [10.1109/icsrs48664.2019.8987693, 10.1109/ICSRS48664.2019.8987693]
[10]
Secure group communication schemes for dynamic heterogeneous distributed computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2017, 74
:313-324