共 50 条
- [41] Hash-based dynamic source routing NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
- [43] BLAST: Off-the-shelf hardware for building an efficient hash-based cluster storage system 2009 6TH IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, 2009, : 148 - 155
- [44] Analysis of a Proposed Hash-Based Signature Standard SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
- [45] A Comparison of Hash-Based Methods for Trajectory Clustering 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
- [46] A hash-based pseudonymization infrastructure for RFID systems SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [47] Hash-tree PCA: accelerating PCA with hash-based grouping The Journal of Supercomputing, 2020, 76 : 8248 - 8264
- [49] DePass: A Secure Hash-based Authentication Scheme 2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
- [50] A Hash-based Secure Interface on Plain Connection 2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1236 - 1239