[1] |
LI Zhongdao, LIU Yuansheng, CHANG Feixiang, ZHANG Jun, LU Ming.
Research on UWB and LiDAR Fusion Positioning Algorithm in Indoor Environment
[J]. Computer Engineering and Applications, 2021, 57(6): 260-266.
|
[2] |
YU Xiaojie, HE Yong, LIU Shenghua.
Improved ORB Feature Optical Flow Algorithm for Indoor Positioning of Unmanned Aerial Vehicle
[J]. Computer Engineering and Applications, 2021, 57(4): 266-271.
|
[3] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[4] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[5] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[6] |
ZHENG Chenhui, CHEN Jing, ZHANG Yuting, XUE Wei.
Fusion Particle Filter and Bluetooth Landmark Correction Localization Algorithm
[J]. Computer Engineering and Applications, 2020, 56(13): 273-278.
|
[7] |
HU Donghai, SHAO Yuan, CHEN Ying, XIA Shixiong.
Indoor Self-Adaption Positioning Algorithm Based on Improved Particle Filter
[J]. Computer Engineering and Applications, 2019, 55(9): 65-71.
|
[8] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[9] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[10] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[11] |
WANG Kai, CHEN Liyun, LI Haopeng.
Website Fingerprinting Attack Method Against SSH Anonymous Traffic
[J]. Computer Engineering and Applications, 2019, 55(21): 99-103.
|
[12] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[13] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[14] |
SU Qing, LI Qian, ZHANG Junyuan, PENG Jiajin, HUANG Shaocong.
Ultra-lightweight RFID ownership transfer protocol of tag based on shared key
[J]. Computer Engineering and Applications, 2018, 54(4): 98-102.
|
[15] |
DU Xuan1,2, GUO Chong3, JIANG Xuefeng2, WANG Zhengmin2, LI Wei2.
Ownership transfer protocol for RFID tags
[J]. Computer Engineering and Applications, 2018, 54(23): 64-67.
|