[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[3] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[4] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[5] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[6] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[7] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[8] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[9] |
QIN Feng, ZENG Hao, LIN Kaidong.
Load Balancing-Based Routing Protocol for LLN Under High-Load Scenario
[J]. Computer Engineering and Applications, 2020, 56(1): 121-126.
|
[10] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[11] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[12] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[13] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[14] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[15] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|