共 17 条
[1]
[Anonymous], 2012, P 2 ED ICN WORKSH IN
[2]
Cheng JF, 2013, 2013 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), P362, DOI 10.1109/ICACI.2013.6748531
[3]
Efstratiou C., 2001, Mobile Data Management. Second International Conference, MDM 2001. Proceedings (Lecture Notes in Computer Science Vol.1987), P15
[4]
Ghim SJ, 2004, LECT NOTES COMPUT SC, V3090, P75
[5]
Khan M. F. F., 2012, 2012 International Conference on Innovations in Information Technology (IIT), P123, DOI 10.1109/INNOVATIONS.2012.6207715
[6]
Kleiner E., 2006, P 6 INT WORKSH AUT V, P91
[7]
Lagger A, 2006, I C FIELD PROG LOGIC, P777
[8]
Compact AES-based architecture for symmetric encryption, hash function, and random number generation
[J].
2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2,
2007,
:480-484
[9]
Li B, 2012, APPL MATH INFORM SCI, V6, P821
[10]
Mentens N, 2006, I C FIELD PROG LOGIC, P133