[1]
Rozlomii , I., Koseniuk, G. and Naumenko , S. 2025. Mechanisms for cryptographic code authentication control in sensor nodes with limited computing resources. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION. 61 (Dec. 2025), 193-198. DOI:https://doi.org/10.36910/6775-2524-0560-2025-61-27.