[1] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[2] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[3] |
YANG Wenxia, WANG Zheng, LI Na, MA Jianfen.
Security Analysis and Improvement of Lightweight Mobile Payment Protocol LMPP
[J]. Computer Engineering and Applications, 2019, 55(16): 88-93.
|
[4] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[5] |
DENG Qingwen, LIN Zhixian, GUO Tailiang.
Multi table image hash retrieval method based on principal component
[J]. Computer Engineering and Applications, 2018, 54(3): 192-199.
|
[6] |
SU Bin1,3, CHENG Ling2, CUI Baojiang1.
Mobile RFID authentication protocol for low-cost tags
[J]. Computer Engineering and Applications, 2018, 54(16): 68-75.
|
[7] |
WANG Yong1,2, CHEN Yan1, ZHAO Yi1.
Parallel Hash function construction based on piecewise Logistic map
[J]. Computer Engineering and Applications, 2018, 54(15): 38-43.
|
[8] |
LI Juanjuan1, GONG Xiangyang2.
Fast cloned tags detection algorithm in large-scale RFID systems
[J]. Computer Engineering and Applications, 2017, 53(8): 106-112.
|
[9] |
CUI Hengshan, TIAN Yuan, DENG Shaojiang.
Improved parallel chaotic hash function using two-way coupled map lattice
[J]. Computer Engineering and Applications, 2016, 52(4): 88-93.
|
[10] |
HUANG Ping, YANG Xiaodong, WANG Caifen.
On-line/off-line signature scheme with strong unforgeability
[J]. Computer Engineering and Applications, 2016, 52(3): 81-84.
|
[11] |
XIAO Hongguang, CHEN Rong, WU Xiaorong, SHI Changqiong, YAN Lihui, ZOU Qiang.
Mobile RFID security authentication protocol based on dynamic key
[J]. Computer Engineering and Applications, 2016, 52(22): 113-117.
|
[12] |
YU Chunwu, GUO Longfei, ZHANG Jian.
HBL: lightweight Hash function
[J]. Computer Engineering and Applications, 2016, 52(20): 1-4.
|
[13] |
SHI Changqiong, WU Dan, XIAO Ruiqiang.
Resistance to denial of service attacks and efficient RFID security authentication protocol
[J]. Computer Engineering and Applications, 2016, 52(2): 105-111.
|
[14] |
LI Huijia, LONG Min.
Design and analysis of HMAC algorithm based on chaotic maps
[J]. Computer Engineering and Applications, 2015, 51(22): 109-114.
|
[15] |
MENG Jinfeng, GAO Zhonghe.
Flow sampling measurement algorithm based on dynamic counting bloom filter
[J]. Computer Engineering and Applications, 2015, 51(17): 92-95.
|