[1] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[2] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[3] |
WANG Zhifeng, ZHAN Jian, ZENG Chunyan, YE Junmin, TIAN Yuan, MIN Qiusha, ZUO Mingzhang.
Survey of Passive Forensics Research on Digital Audio Sources
[J]. Computer Engineering and Applications, 2020, 56(5): 1-12.
|
[4] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[5] |
DU Hao, YANG Yan, ZHANG Chengjie.
Application of Virtual Reality Technology in Flexible Upper Limb Rehabilitation Robot
[J]. Computer Engineering and Applications, 2020, 56(24): 260-265.
|
[6] |
WANG Aling, LIU Yuan, WANG Xiaofeng.
Research on Network Measurement Technology Combining Active and Passive
[J]. Computer Engineering and Applications, 2020, 56(21): 93-102.
|
[7] |
ZHANG Junhao, WU Fei, ZHU Hai.
WiFi Gesture Recognition Method Based on GD-Kmeans and Fresnel Theory
[J]. Computer Engineering and Applications, 2020, 56(19): 126-131.
|
[8] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[9] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[10] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[11] |
ZENG Chunyan1, WANG Zhifeng2, WANG Jing2, TIAN Yuan2, YE Junmin3, ZUO Mingzhang2.
Survey of Passive Detection of Digital Audio Tampering
[J]. Computer Engineering and Applications, 2019, 55(2): 1-11.
|
[12] |
ZHANG Xia, HU Jinjia, CHEN Lili, CHEN Renxiang.
CPG Control and Analysis of Its Key Parameters in Motion Assistance
[J]. Computer Engineering and Applications, 2019, 55(17): 239-245.
|
[13] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[14] |
ZHANG Shujuan1, ZHANG Juan2.
Dynamical Modeling and Analysis of Passive Worms Propagation in P2P Networks
[J]. Computer Engineering and Applications, 2019, 55(11): 60-66.
|
[15] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|