共 50 条
- [21] Hash-based dynamic source routing NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
- [22] Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 147 - 163
- [23] Hash-Based TPM Signatures for the Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
- [24] Fast hash-based signatures on constrained devices SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +
- [25] Analysis of a Proposed Hash-Based Signature Standard SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
- [26] A Comparison of Hash-Based Methods for Trajectory Clustering 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
- [27] A hash-based pseudonymization infrastructure for RFID systems SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [28] Hash-tree PCA: accelerating PCA with hash-based grouping The Journal of Supercomputing, 2020, 76 : 8248 - 8264
- [29] Faster Hash-Based Signatures with Bounded Leakage SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 223 - 243