Rozlomii , I., Koseniuk, G., & Naumenko , S. (2025). Mechanisms for cryptographic code authentication control in sensor nodes with limited computing resources. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (61), 193-198. https://doi.org/10.36910/6775-2524-0560-2025-61-27