[1] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[2] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[3] |
YANG Xinmin, DONG Hongbin, TAN Chengyu, ZHOU Wen.
Dendritic Cell Model Using Singular Value Decomposition and Information Gain
[J]. Computer Engineering and Applications, 2021, 57(15): 156-162.
|
[4] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[5] |
CHEN Haiyang, LIU Xiqing, HUAN Xiaomin.
One-step Prediction SVDDBN Missing Data Interpolation Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 81-87.
|
[6] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[7] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[8] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|
[9] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[10] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[11] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|
[12] |
LI Xiongwei1, WEI Yanhai1, WANG Xiaohan1, XU Lu2, SUN Ping3.
Improved Incremental SVDD Learning Algorithm for Hardware Trojan Detection
[J]. Computer Engineering and Applications, 2019, 55(9): 43-48.
|
[13] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[14] |
YANG Minghui, ZOU Xiang.
Evaluation of US Electronic Identity Guide
[J]. Computer Engineering and Applications, 2019, 55(23): 22-28.
|
[15] |
CAO Hao, CHEN Lili, SI Jibing, REN Junlan.
Singular Value Decomposition and Sparse Automatic Encoder for Bearing Fault Diagnosis
[J]. Computer Engineering and Applications, 2019, 55(20): 257-262.
|