共 50 条
- [41] Analysis of a Proposed Hash-Based Signature Standard SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
- [42] A hash-based pseudonymization infrastructure for RFID systems SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [43] A Comparison of Hash-Based Methods for Trajectory Clustering 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
- [44] Hash-tree PCA: accelerating PCA with hash-based grouping The Journal of Supercomputing, 2020, 76 : 8248 - 8264
- [45] DePass: A Secure Hash-based Authentication Scheme 2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
- [47] Hash-tree PCA: accelerating PCA with hash-based grouping JOURNAL OF SUPERCOMPUTING, 2020, 76 (10): : 8248 - 8264
- [48] A Hash-based Secure Interface on Plain Connection 2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1236 - 1239