共 50 条
- [41] A new hash-based authentication protocol for RFID using varying identifiers SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
- [42] Hash-Based TPM Signatures for the Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
- [43] Fast hash-based signatures on constrained devices SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +
- [44] Analysis of a Proposed Hash-Based Signature Standard SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
- [45] A Comparison of Hash-Based Methods for Trajectory Clustering 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
- [46] A hash-based pseudonymization infrastructure for RFID systems SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [47] Hash-Based Virtual Hierarchies for Scalable Location Service in Mobile Ad-hoc Networks Mobile Networks and Applications, 2009, 14 : 625 - 637
- [48] Hash-tree PCA: accelerating PCA with hash-based grouping The Journal of Supercomputing, 2020, 76 : 8248 - 8264