[1] |
Chen ZHANG, Hongkai WANG, Dong MAO, Sichen PAN, Shuai ZHAO.
Research and application of 5G lightweight hardware encryption module for power terminals
[J]. Telecommunications Science, 2023, 39(6): 159-169.
|
[2] |
Fengzhong QU, Hangliang LAI, Jianzhang LIU, Xingbin TU, Yuan JIANG.
Research and application on key techniques of marine IoT
[J]. Telecommunications Science, 2021, 37(7): 25-33.
|
[3] |
Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG.
A lightweight privacy-preserving truth discovery mechanism for IoT
[J]. Telecommunications Science, 2021, 37(5): 124-132.
|
[4] |
Junfeng MA, Zhiruo LIU, Guanwen LI, Fei YANG, Juanna DANG.
A lightweight and trusted communication protocol for IoT
[J]. Telecommunications Science, 2021, 37(11): 33-40.
|
[5] |
Qijie SONG,Tieming CHEN,Yuan CHEN,Dongjie MA,Zhengqiu WENG.
Research on consensus mechanism optimization for IoT blockchain
[J]. Telecommunications Science, 2020, 36(2): 1-12.
|
[6] |
Changyi CHEN,Gang LU,Lisha ZHOU,Zeyuan HUANG,Zhuangzhan MA.
Cloud native based lightweight 5GC product and key technologies
[J]. Telecommunications Science, 2020, 36(12): 89-95.
|
[7] |
Shanhua ZHAN,Shaorong HUANG.
A bidirectional authentication protocol for RFID based on Syn
[J]. Telecommunications Science, 2018, 34(12): 65-70.
|
[8] |
Wenwen DENG,Chengming SUN,Peiliang QIN.
A bidirectional authentication protocol for mobile RFID system based on PRF
[J]. Telecommunications Science, 2018, 34(10): 96-103.
|
[9] |
Chuan LI,Xuejun LI.
A secure authentication method based on hash function for RFID system
[J]. Telecommunications Science, 2017, 33(6): 129-137.
|
[10] |
Biyuan JIAN,Daowei LIU.
Mobile RFID system authentication protocol based on one-way pseudo random function
[J]. Telecommunications Science, 2017, 33(6): 138-145.
|
[11] |
Tao GUO,Jianting HAN,Xiaoling YANG.
Key technique of dynamic interface rendering based on device control of smart home App
[J]. Telecommunications Science, 2017, 33(10): 177-184.
|
[12] |
Yong WANG,Ting LI.
Improved RFID anti-collision algorithm based on ALOHA Abstract:In order to solve the problem of low efficiency of electronic tag identification in RFID system,a new ALOHA anti-collision algorithm was presented.In this algorithm,the coefficients of the tag estimation were automatically changed by using the dynamic adjustment method,which made the number of tag estimation could be dynamic changed with the number of identified tags,then the number of tags to be identified was estimated.And for the frame length adjustment,it could be determined by the relationship between the length of the frame and the tag number according to the estimated number of tags.With the tool of MATLAB,the results show that the proposed algorithm can significantly improve the throughput and stability of the system.
[J]. Telecommunications Science, 2016, 32(8): 77-81.
|
[13] |
Wumei ZHANG.
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
[J]. Telecommunications Science, 2016, 32(5): 121-126.
|
[14] |
Wei DING,Shuquan LI,Siwei LI,Liangrui TANG,Dandan SUN.
An optimized routing algorithm in WSN for smart park
[J]. Telecommunications Science, 2016, 32(3): 171-175.
|
[15] |
Wenzhao WU,Xiao WANG,Kunpeng ZHAO,Yafeng WEN.
Indoor localization algorithm based on RFID technology for smart park
[J]. Telecommunications Science, 2016, 32(3): 187-191.
|