[1] |
XUE Wei-lian, LI Xue-jiao, CHEN Jie.
A Multi-period Anti-collision Tree Search Algorithm Based on ALOHA Partition
[J]. Computer and Modernization, 2021, 0(11): 95-99.
|
[2] |
ZHOU Jing , , DONG Guo-chao , , DENG Zu-qiang , , ZHANG Jin-luan , , LIU Chao , , NIU Yong-liang .
Two-way Security Authentication RFID Protocol Based on Random Hash Chain
[J]. Computer and Modernization, 2021, 0(03): 46-50.
|
[3] |
DENG Zu-qiang, LIU Chao, ZHOU Jing, ZHANG Jin-luan, DONG Guo-chao, .
Design of RFID Power Tag for Electrical Equipment Against Electromagnetic Interference
[J]. Computer and Modernization, 2021, 0(01): 12-16.
|
[4] |
LIANG Xiao-qi1, DAI Yong-hui2, ZANG Hong-yan1.
Intelligent Attendance System Based on Dual Positioning Technology
[J]. Computer and Modernization, 2020, 0(01): 58-.
|
[5] |
WANG Yi-chao1, WANG Yu-mei2.
Intelligent Equipment Maintenance and Management Platform#br#
Based on Microservice Architecture
[J]. Computer and Modernization, 2018, 0(10): 79-.
|
[6] |
JIAN Bi-yuan1, WANG Hai-tao2, LIU Dao-wei1.
A RFID Mutual-authentication Protocol
[J]. Computer and Modernization, 2017, 0(7): 107-110.
|
[7] |
WEI Shu-min, ZHANG Yong-hua, SHANG Yu-fang.
Research and Design of Lightweight Mobile RFID Authentication Protocol
[J]. Computer and Modernization, 2016, 0(11): 74-78.
|
[8] |
CHU Guiyang.
A Low Cost Secure Ownership Transferring Method of RFID Network
[J]. Computer and Modernization, 2016, 0(10): 84-87.
|
[9] |
FENG Hui-ying, ZHOU Liang.
Adaptive RFID Data Cleaning Algorithm Based on Sliding-window
[J]. Computer and Modernization, 2015, 0(1): 31-36.
|
[10] |
LIN Ji-yan1, LI Yao2.
RFID Tags of Drunk Driving Monitoring Systems Vehicle-mounted Terminal
[J]. Computer and Modernization, 2015, 0(1): 109-112.
|
[11] |
KOU Manman, WANG Qinzhong, WAN Na.
Study and Implementation of Fast Vectorization for Raster Map Road
[J]. Computer and Modernization, 2014, 0(9): 82-85.
|
[12] |
MA Yan1, CAI Li-xia2, REN Xiao-na2.
An Adoptive Frame Based Anticollision Algorithm for RFID Systems
[J]. Computer and Modernization, 2014, 0(11): 113-116.
|
[13] |
LI Meng-jia, LI Zhan-huai, LI Ning, YE Chen.
Windows System Performance Monitoring Technology Based on ETW
[J]. Computer and Modernization, 2014, 0(1): 1-4,9.
|
[14] |
GONG Hua-ming;YIN Duo-fen.
Complex Event Processing Model of RFID Middleware
[J]. Computer and Modernization, 2013, 1(9): 232-235.
|
[15] |
LIAO Jian-feng;ZHANG Chao.
RFID Security Protocol Based on Reader and Double ID Verification
[J]. Computer and Modernization, 2013, 1(8): 179-183.
|