[1] |
张平, 李建武, 冯志勇 ,等. 认知无线网络基础理论与关键技术研究[J]. 电信科学, 2014,30(2): 1-13.
|
|
ZHANG P , LI J W , FENG Z Y ,et al. Research on basic theory and key technology of cognitive radio network[J]. Telecommunications Science, 2014,30(2): 1-13.
|
[2] |
MUNILLA J , BURMESTER M , PEINADO A ,et al. RFID ownership transfer with positive secrecy capacity channels[J]. Sensors, 2017,17(1): 53-70.
|
[3] |
CHIOU S Y , KO W T , LU E H . A secure ECC-based mobile RFID mutual authentication protocol and its application[J]. International Jouranl of Network Security, 2018,20(2): 396-402.
|
[4] |
BURMESTER M , MUNILLA J , ORTIZ A ,et al. An RFID-based smart structure for the supply chain:resilient scanning proofs and ownership transfer with positive secrecy capacity channels[J]. Sensors, 2017,17(7): 1562-1581.
|
[5] |
LI X D , ZHOU C L , XU N . A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos[J]. International Journal of Network Security, 2018,20(1): 110-120.
|
[6] |
冯剑, 王平阳, 王琳 ,等. 基于能量获取的无线通信系统研究[J]. 电信科学, 2015,31(2): 124-131.
|
|
FENG J , WANG P Y , WANG L ,et al. Research on energy harvesting communication system[J]. Telecommunications Science, 2015,31(2): 124-131.
|
[7] |
周恒, 畅志贤, 杨武军 ,等. 一种5G网络切片的编排算法[J]. 电信科学, 2017,33(8): 130-137.
|
|
ZHOU H , CHANG Z X , YANG W J ,et al. An orchestration algorithm of 5G network slicing[J]. Telecommunications Science, 2017,33(8): 130-137.
|
[8] |
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification[J]. Journal of Communications, 2015,10(2).
|
[9] |
QIAN Q , JIA Y L , ZHANG R . A lightweight RFID security protocol based on elliptic curve cryptography[J]. International Journal of Network Security, 2016,18(2): 354-361.
|
[10] |
NOUREDDINE C , FOUDIL C , CAYREL P L ,et al. Improved RFID authentication protocol based on randomized McEliece cryptosystem[J]. International Journal of Network Security, 2015,17(4): 413-422.
|
[11] |
XIE R , JIAN B Y , LIU D W . An improved ownership transfer for RFID protocol[J]. International Journal of Network Security, 2018,20(1): 149-156.
|
[12] |
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011,34(3): 337-341.
|
[13] |
庞晓丹, 李薇薇, 孙茜 ,等. LTE无线网络虚拟化中切片调度策略[J]. 电信科学, 2017,33(2): 66-72.
|
|
PANG X D , LI W W , SUN Q ,et al. Slice scheduling strategy in LTE wireless network virtualization[J]. Telecommunications Science, 2017,33(2): 66-72.
|
[14] |
TIAN Y , CHEN G L , LI J H . A new ultra-lightweight RFID authentication protocol with permutation[J]. IEEE Communications Letters, 2012,16(5): 702-705.
|