[1] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[2] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[3] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[4] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[5] |
QIU Hongwei1, JIAN Biyuan2.
RFID tag ownership transfer protocol based on wheel function
[J]. Computer Engineering and Applications, 2018, 54(16): 101-106.
|
[6] |
SU Bin1,3, CHENG Ling2, CUI Baojiang1.
Mobile RFID authentication protocol for low-cost tags
[J]. Computer Engineering and Applications, 2018, 54(16): 68-75.
|
[7] |
XIAO Hongguang, ZOU Qiang.
Reducing cost of invalid slot algorithm for RFID anti-collision
[J]. Computer Engineering and Applications, 2017, 53(5): 97-102.
|
[8] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[9] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[10] |
XIAO Hongguang, CHEN Rong, WU Xiaorong, SHI Changqiong, YAN Lihui, ZOU Qiang.
Mobile RFID security authentication protocol based on dynamic key
[J]. Computer Engineering and Applications, 2016, 52(22): 113-117.
|
[11] |
SHI Changqiong, WU Dan, XIAO Ruiqiang.
Resistance to denial of service attacks and efficient RFID security authentication protocol
[J]. Computer Engineering and Applications, 2016, 52(2): 105-111.
|
[12] |
ZHANG Min, DU Weizhang.
Publicly verifiable and periodically renewable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2016, 52(2): 117-126.
|
[13] |
ZHAI Zhengyuan, GAO Dezhi, LIANG Xiangqian, PAN Shuai.
Certificate-based proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 57-62.
|
[14] |
HAO Xin, YANG Pin, LI Kun.
NTRU-based RFID tripartite authentication protocol
[J]. Computer Engineering and Applications, 2014, 50(3): 63-66.
|
[15] |
ZHANG Yichen, JIANG Yong, LI Jiguo.
Provably secure directed transitive signature
[J]. Computer Engineering and Applications, 2014, 50(19): 74-77.
|