相似文献/References:
[1]孙科学,张瑛,周明秀.跳跃式二进制防碰撞算法的设计与实现[J].计算机技术与发展,2013,(04):59.
SUN Ke-xue,ZHANG Ying,ZHOU Ming-xiu.Design and Implementation of an Anti-collision Algorithm of Jumping Binary[J].,2013,(07):59.
[2]张学军,陈彦君,常昆.改进型RFID相互认证协议研究[J].计算机技术与发展,2013,(08):129.
ZHANG Xue-jun[],CHEN Yan-jun[],CHANG Kun[].An Improved RFID Mutual Authentication Protocol[J].,2013,(07):129.
[3]张建敏,王钢.基于WSID网络的智能监测技术的研究与实现[J].计算机技术与发展,2014,24(02):202.
ZHANG Jian-min,WANG Gang.Research and Implementation of Intelligent Monitoring Technology Based on WSID[J].,2014,24(07):202.
[4]张学军[][],马军飞[],鲁友[]. 基于位编码单元的双时隙防碰撞算法[J].计算机技术与发展,2014,24(09):93.
ZHANG Xue-jun[][],MA Jun-fei[],LU You[]. A Bi-slot Anti-collision Algorithm Based on Bits Coding Unit[J].,2014,24(07):93.
[5]姜武,杨恒新,张昀. 一种改进的查询树RFID标签防碰撞算法[J].计算机技术与发展,2015,25(02):86.
JIANG Wu,YANG Heng-xin,ZHANG Yun. An Improved Query Tree Anti-collision Algorithm in RFID Systems[J].,2015,25(07):86.
[6]张学军,常昆,王玉. 基于标签编组的RFID相互认证协议[J].计算机技术与发展,2015,25(04):102.
ZHANG Xue-jun,CHANG Kun,WANG Yu. An RFID Mutual Authentication Protocol Based on Tag Grouping[J].,2015,25(07):102.
[7]王珺吉,杜 燕,张建宏,等.智能仓储管理系统设计与实现[J].计算机技术与发展,2019,29(12):189.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 034]
WANG Jun-ji,DU Yan,ZHANG Jian-hong,et al.Design and Implementation of Intelligent Warehouse Management Information System[J].,2019,29(07):189.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 034]
[8]孟秋云,殷宪祯,徐 鹤.基于 USRP 的无线射频识别平台设计与实现[J].计算机技术与发展,2021,31(03):168.[doi:10. 3969 / j. issn. 1673-629X. 2021. 03. 029]
MENG Qiu-yun,YIN Xian-zhen,XU He.Design and Implementation of RFID Platform Based on USRP[J].,2021,31(07):168.[doi:10. 3969 / j. issn. 1673-629X. 2021. 03. 029]
[9]郝伟伟,吕 磊.基于伪随机数发生器的移动 RFID 双向认证算法[J].计算机技术与发展,2022,32(05):93.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 016]
HAO Wei-wei,LYU Lei.Mobile RFID Bidirectional Authentication Algorithm Based on Pseudo Random Number Generator[J].,2022,32(07):93.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 016]
[10]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(07):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]