[1] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[2] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[3] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[4] |
TAN Zhenghua, DAI Liping, WEN Yang, LI Guotai.
Decision Tree Construction Method Based on Reduction Attribute and Threshold Segmentation
[J]. Computer Engineering and Applications, 2020, 56(22): 160-165.
|
[5] |
ZHANG Xiao, SUN Yiming, WU Xufeng.
Research on Query-Aware Relation-Graph Database Adaptive Storage Technology
[J]. Computer Engineering and Applications, 2020, 56(17): 100-108.
|
[6] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[7] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[8] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[9] |
LIANG Yubin1,2,3, LIANG Qiaokang1,2,3, WU Guiyuan1,2,3, WU Wanneng1,2,3, SUN Wei1,2,3, WANG Yaonan1,3.
3RPS/UPS Parallel Robot Back-Stepping Control Based on Neural Network Observer
[J]. Computer Engineering and Applications, 2019, 55(4): 255-262.
|
[10] |
ZHU Jingwei, FANG Husheng, SHAO Faming, JIANG Chengming.
Self-Adaptive Particle Swarm Optimization Algorithm for Solving Inverse Kinematics Problem of Redundant Manipulator
[J]. Computer Engineering and Applications, 2019, 55(14): 215-220.
|
[11] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[12] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[13] |
WANG Xin1, ZHU Hangcheng1, NING Chen2, WANG Huibin1.
Image inpainting based on redundant dictionary learning
[J]. Computer Engineering and Applications, 2018, 54(6): 198-204.
|
[14] |
SU Qing, LI Qian, ZHANG Junyuan, PENG Jiajin, HUANG Shaocong.
Ultra-lightweight RFID ownership transfer protocol of tag based on shared key
[J]. Computer Engineering and Applications, 2018, 54(4): 98-102.
|
[15] |
DU Xuan1,2, GUO Chong3, JIANG Xuefeng2, WANG Zhengmin2, LI Wei2.
Ownership transfer protocol for RFID tags
[J]. Computer Engineering and Applications, 2018, 54(23): 64-67.
|