共 50 条
- [21] A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (01): : 597 - 616
- [22] Posture strategies generated by constrained optimization [J]. JOURNAL OF BIOMECHANICS, 2012, 45 (03) : 461 - 468
- [23] Blockchains for constrained edge devices [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2020, 1 (1-2):
- [24] PGP in constrained wireless devices [J]. USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 247 - 261
- [25] Dilithium for Memory Constrained Devices [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 217 - 235
- [26] Wavelet library for constrained devices [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [27] MASS Communication for Constrained Devices [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
- [28] Lightweight Cryptography for Constrained Devices [J]. 2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 144 - 147