UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
A Security-Enhanced, Charge-Pump-Free, ISO14443-A-/ISO10373-6-Compliant RFID Tag With 16.2-μW Embedded RRAM and Reconfigurable Strong PUF Journal article
Qirui Ren, Qiang Huo, Zhisheng Chen, Qi Gao, Yiming Wang, Yiming Yang, Hao Wu, Xiangqu Fu, Xiaoxin Xu, Qing Luo, Jianfeng Gao, Chengying Chen, Xiaojin Zhao, Dengyun Lei, Xinghua Wang, Feng Zhang, Yong Chen, Pui-In Mak. A Security-Enhanced, Charge-Pump-Free, ISO14443-A-/ISO10373-6-Compliant RFID Tag With 16.2-μW Embedded RRAM and Reconfigurable Strong PUF[J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 31(2), 243-252.
Authors:  Qirui Ren;  Qiang Huo;  Zhisheng Chen;  Qi Gao;  Yiming Wang; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:2.8/2.8 | Submit date:2023/01/30
Current Sense Amplifier (Csa)  Low Cost  Low Power  Physical Unclonable Function (Puf)  Radio Frequency Identification Technology (Rfid)  Resistive Ram (rRam)  Security  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Zhou Z., Wang G., Liu Q., Jia W.. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55(12), 2674-2684.
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite | TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic Curve Cryptography  Grouping-proof  Privacy  Rfid Security  
Internet of things' authentication and access control Journal article
Liu J., Xiao Y., Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite | TC[Scopus]:32 | Submit date:2019/02/11
Access Control  Authentication  Iot  Rfid  Security  
Detection of Suspicious Patterns in Secure Physical Environments Conference paper
Pengfan Yan, Robert P. Biuk-Aghai, Simon Fong, Yain-Whar Si. Detection of Suspicious Patterns in Secure Physical Environments[C], 2007, 40-45.
Authors:  Pengfan Yan;  Robert P. Biuk-Aghai;  Simon Fong;  Yain-Whar Si
Favorite |  | Submit date:2019/02/13
Data Mining  Rfid  Security