共 50 条
- [3] A lightweight secure cyber foraging infrastructure for resource-constrained devices SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195
- [5] Lightweight Cryptography for Resource Constrained Devices HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564
- [6] SAFE: Secure and Fast Key Establishment for Resource Constrained Devices in Device to Device Communications MACHINE LEARNING, IMAGE PROCESSING, NETWORK SECURITY AND DATA SCIENCES, MIND 2022, PT II, 2022, 1763 : 293 - 307
- [7] A Secure Authentication Mechanism for Resource Constrained Devices 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
- [10] Secure AES hardware module for resource constrained devices SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 215 - 229