1.
Rozlomii I, Koseniuk G, Naumenko S. Mechanisms for cryptographic code authentication control in sensor nodes with limited computing resources. cit [Internet]. 2025Dec.5 [cited 2025Dec.19];(61):193-8. Available from: https://cit.lntu.edu.ua/index.php/cit/article/view/826