共 6 条
- [1] [Anonymous], CRYPT HASH ALG COMP
- [2] Fettweis G. P., 2008, P 11 INT S WIR PERS
- [3] Kaps JP, 2006, LECT NOTES COMPUT SC, V4097, P372
- [4] Analyzing the energy consumption of security protocols [J]. ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, : 30 - 35
- [5] Green IT - More Than a Three Percent Solution? [J]. IEEE INTERNET COMPUTING, 2009, 13 (04) : 74 - 78
- [6] VAMPIRE lab, SUP SYST UN PERF EV