共 50 条
- [21] A Secure Channel Establishment Method on A Hardware Security Module 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 555 - 556
- [25] X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 183 - 210
- [26] Cognitive Secure Shield - A Machine Learning enabled threat shield for resource constrained IoT Devices 2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1073 - 1080
- [28] AES Hardware Accelerator on FPGA with Improved Throughput and Resource Efficiency Arabian Journal for Science and Engineering, 2018, 43 : 6873 - 6890
- [30] Lightweight Cryptography for Resource Constrained Devices HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564