[1] |
REN Chunhui, LIU Sheng, ZHANG Weikang, ZHANG Weiwei.
Optimization and Application of Cauchy Mutation Camel Algorithm
[J]. Computer Engineering and Applications, 2021, 57(21): 87-94.
|
[2] |
FENG Xiaodong, HUANG Shirong, DAI Guan’ou, YANG Weijia, LUO Yaozhi.
Research and Application of Beetle Antennae Genetic Hybrid Algorithm
[J]. Computer Engineering and Applications, 2021, 57(15): 90-100.
|
[3] |
LIAO Liefa, YANG Hong.
Review of Beetle Antennae Search
[J]. Computer Engineering and Applications, 2021, 57(12): 54-64.
|
[4] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[5] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[6] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[7] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[8] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[9] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[10] |
WANG Hui,XIAO Kun.
Performance Analysis of Data and Energy Antenna Selection in EH-MIMO Cooperative Networks
[J]. Computer Engineering and Applications, 2019, 55(15): 128-134.
|
[11] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[12] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[13] |
SU Qing, LI Qian, ZHANG Junyuan, PENG Jiajin, HUANG Shaocong.
Ultra-lightweight RFID ownership transfer protocol of tag based on shared key
[J]. Computer Engineering and Applications, 2018, 54(4): 98-102.
|
[14] |
DU Xuan1,2, GUO Chong3, JIANG Xuefeng2, WANG Zhengmin2, LI Wei2.
Ownership transfer protocol for RFID tags
[J]. Computer Engineering and Applications, 2018, 54(23): 64-67.
|
[15] |
SHAO Liangshan, HAN Ruida.
Beetle antenna search flower pollination algorithm
[J]. Computer Engineering and Applications, 2018, 54(18): 188-194.
|