共 50 条
- [41] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey [J]. Cluster Computing, 2022, 25 : 1729 - 1748
- [42] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1729 - 1748
- [44] Resource-aware Security Configuration for Constrained IoT Devices [J]. PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 7 - 14
- [45] Fully Distributed Deep Learning Inference on Resource-Constrained Edge Devices [J]. EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 77 - 90
- [46] Lightweight Security Algorithms for Resource-constrained IoT-based Sensor Nodes [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
- [50] DeeperThings: Fully Distributed CNN Inference on Resource-Constrained Edge Devices [J]. International Journal of Parallel Programming, 2021, 49 : 600 - 624