[1] |
GUO Kaimin, XIE Xin, MA Yijie, QI Heng, LI Keqiu.
Fast and Reliable Unknown Tag Identification for Large-Scale RFID System
[J]. Computer Engineering, 2023, 49(3): 192-202.
|
[2] |
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong.
Time-based One-Time Password Scheme for PLC
[J]. Computer Engineering, 2021, 47(8): 149-156.
|
[3] |
LIAN Wenjuan, ZHAO Duoduo, FAN Xiubin.
CFL SSL Security Communication Protocol Based on CFL_BLP Model
[J]. Computer Engineering, 2021, 47(6): 152-163.
|
[4] |
WU Tiantian, YANG Yafang, ZHAO Yunlei.
An Authentication Protocol with Conditional Privacy Protection for IoV Communication
[J]. Computer Engineering, 2021, 47(6): 14-22.
|
[5] |
LIU Qilie, CHEN Cheng.
Anonymous Identity Authentication Scheme in V2G Based on Blockchain
[J]. Computer Engineering, 2021, 47(11): 22-28.
|
[6] |
ZHANG Pengming, ZHANG Xiaomei, HU Jianpeng.
Implicit Authentication Scheme for Smart Phone Based on Dynamic Trust Value
[J]. Computer Engineering, 2021, 47(10): 132-139,146.
|
[7] |
YANG Jiyun, YAO Ruidong, ZHOU Jie, GAO Lingyun.
Efficient Authentication Scheme Based on Chebyshev Chaotic Map for VANET
[J]. Computer Engineering, 2021, 47(10): 34-42,51.
|
[8] |
LIN Mengqi, ZHANG Xiaomei.
Identity Authentication of Multi-Modal Fusion Based on Behavioral Footprint
[J]. Computer Engineering, 2021, 47(10): 116-124.
|
[9] |
YANG Xueting, LI Zhong.
Identity Authentication Scheme Based on Vehicle Behavior Prediction for IoV
[J]. Computer Engineering, 2021, 47(1): 129-138.
|
[10] |
LIU Yanan, ZHANG Zheng, QIU Shuo, CHENG Yuan.
Intra-Cluster Key Distribution Based on Physical Unclonable Functions in WSN
[J]. Computer Engineering, 2020, 46(9): 163-171.
|
[11] |
PAN Shesu, ZHANG Jijun, ZHANG Zhaofeng.
Key Generation Scheme for RFID Tag Based on SRAM PUF Stability Processing
[J]. Computer Engineering, 2020, 46(9): 149-153,162.
|
[12] |
DONG Xuanjiang, LI Shibao, CAI Liping, YUAN Jing.
Anti-collision Query Tree Algorithm Based on Group Mapping
[J]. Computer Engineering, 2020, 46(8): 184-189,196.
|
[13] |
WANG Shuai, YANG Hengxin, YANG Hua.
Tree Anti-Collision Algorithm Based on Pseudo ID Code
[J]. Computer Engineering, 2020, 46(4): 177-182.
|
[14] |
REN Dezhi, CHEN Juguang, WANG Yong, DUAN Xiaoran, HAO Yujie, WU Xiaohua.
Spatial Query Authentication Method Based on MIR Tree
[J]. Computer Engineering, 2020, 46(3): 114-119,128.
|
[15] |
YANG Xiaodong, PEI Xizhen, AN Faying, LI Ting, WANG Caifen.
Message Authentication Scheme for Vehicular Ad Hoc Network Using Identity-based Aggregate Signature
[J]. Computer Engineering, 2020, 46(2): 170-174,182.
|