[1] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[2] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[3] |
GAO Shujing, WANG Chenglong, DONG Tingkun.
Optimized Adaboost Face Detection Based on ZYNQ
[J]. Computer Engineering and Applications, 2020, 56(6): 201-206.
|
[4] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[5] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[6] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|
[7] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[8] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[9] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|
[10] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[11] |
YANG Minghui, ZOU Xiang.
Evaluation of US Electronic Identity Guide
[J]. Computer Engineering and Applications, 2019, 55(23): 22-28.
|
[12] |
ZHANG Hua, CAO Lin.
Face Sketch Synthesis Method Combining pHash and Sparse Coding
[J]. Computer Engineering and Applications, 2019, 55(22): 187-194.
|
[13] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[14] |
LI Xiaowen, LI Yangyang, LEI Xiu.
Research and Implementation of Authentication and Key Agreement Process in 5G Client
[J]. Computer Engineering and Applications, 2019, 55(11): 35-39.
|
[15] |
HUANG Guosheng1, 2, XIA Minghua2.
USBKey aided certificateless mobile IP registration authentication protocol
[J]. Computer Engineering and Applications, 2018, 54(9): 96-100.
|