共 29 条
[2]
Dilli R, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), P455, DOI 10.1109/CSITSS.2016.7779410
[3]
Fox Armando., 1996, 2nd Annual International Conference on Mobile Computing and Networking (Mobi-Com), P155
[4]
Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority
[J].
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT),
2014,
:724-728
[5]
Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2012, 14 (02)
:279-298
[6]
The PHOTON Family of Lightweight Hash Functions
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2011,
2011, 6841
:222-239
[7]
MASR: A Modular Accelerator for Sparse RNNs
[J].
2019 28TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT 2019),
2019,
:1-14
[8]
RAD: Reinforcement Authentication DYMO Protocol for MANET
[J].
2019 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2019),
2019,
:136-141
[9]
Jadhav S.P., 2019, J MOB MULTIMED, P91, DOI [10.13052/jmm1550-4646.1521, DOI 10.13052/JMM1550-4646.1521]
[10]
Junnarkar A.A., 2018, INT C CONV TECHN I2C, P1