[1] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[2] |
DENG Qingwen, LIN Zhixian, GUO Tailiang.
Multi table image hash retrieval method based on principal component
[J]. Computer Engineering and Applications, 2018, 54(3): 192-199.
|
[3] |
WANG Yong1,2, CHEN Yan1, ZHAO Yi1.
Parallel Hash function construction based on piecewise Logistic map
[J]. Computer Engineering and Applications, 2018, 54(15): 38-43.
|
[4] |
WANG Yong1,2, MA Jianbin1, CHEN Yan1, HE Bo2.
New pseudorandom number generator based on spatiotemporal chaos
[J]. Computer Engineering and Applications, 2018, 54(11): 97-102.
|
[5] |
LI Juanjuan1, GONG Xiangyang2.
Fast cloned tags detection algorithm in large-scale RFID systems
[J]. Computer Engineering and Applications, 2017, 53(8): 106-112.
|
[6] |
LI Hongyan, YANG Wanli.
Research on method of distilling binary pseudo-random sequence from Gray-Scott system
[J]. Computer Engineering and Applications, 2017, 53(13): 66-71.
|
[7] |
WU Weimin, ZHANG Jingjing, LIN Zhiyi, SU Qing.
Antlion optimization algorithm based on double feedback mechanism
[J]. Computer Engineering and Applications, 2017, 53(12): 31-35.
|
[8] |
CUI Hengshan, TIAN Yuan, DENG Shaojiang.
Improved parallel chaotic hash function using two-way coupled map lattice
[J]. Computer Engineering and Applications, 2016, 52(4): 88-93.
|
[9] |
HUANG Ping, YANG Xiaodong, WANG Caifen.
On-line/off-line signature scheme with strong unforgeability
[J]. Computer Engineering and Applications, 2016, 52(3): 81-84.
|
[10] |
YU Chunwu, GUO Longfei, ZHANG Jian.
HBL: lightweight Hash function
[J]. Computer Engineering and Applications, 2016, 52(20): 1-4.
|
[11] |
LI Huijia, LONG Min.
Design and analysis of HMAC algorithm based on chaotic maps
[J]. Computer Engineering and Applications, 2015, 51(22): 109-114.
|
[12] |
MENG Jinfeng, GAO Zhonghe.
Flow sampling measurement algorithm based on dynamic counting bloom filter
[J]. Computer Engineering and Applications, 2015, 51(17): 92-95.
|
[13] |
HE Bintao1, LIU Lihua1, DENG Fang’an1, WANG Shangping2.
Hash function based on chaotic message expansion
[J]. Computer Engineering and Applications, 2015, 51(14): 78-83.
|
[14] |
WEN Yamin1, LI Fengxia2, GONG Zheng3, TANG Shaohua2.
Optimized implementation of Quark hash function for lightweight AVR microcontrollers
[J]. Computer Engineering and Applications, 2014, 50(23): 104-107.
|
[15] |
YANG Xiaoling, YANG Geng, ZHU Wei.
Encryption system based on virtual optical and spatiotemporal chaos
[J]. Computer Engineering and Applications, 2014, 50(1): 68-73.
|