[1]
I. Rozlomii, G. Koseniuk, and S. Naumenko, “Mechanisms for cryptographic code authentication control in sensor nodes with limited computing resources”, cit, no. 61, pp. 193-198, Dec. 2025.