相似文献/References:
[1]刘富春 周受钦.基于RFID的物流装备信息监控网络平台设计[J].计算机技术与发展,2012,(07):227.
LIU Fu-chun,ZHOU Shou-qin.Monitoring Framework Design for Logistics Equipment Based on RFID[J].,2012,(05):227.
[2]孙科学,张瑛,周明秀.跳跃式二进制防碰撞算法的设计与实现[J].计算机技术与发展,2013,(04):59.
SUN Ke-xue,ZHANG Ying,ZHOU Ming-xiu.Design and Implementation of an Anti-collision Algorithm of Jumping Binary[J].,2013,(05):59.
[3]张学军,陈彦君,常昆.改进型RFID相互认证协议研究[J].计算机技术与发展,2013,(08):129.
ZHANG Xue-jun[],CHEN Yan-jun[],CHANG Kun[].An Improved RFID Mutual Authentication Protocol[J].,2013,(05):129.
[4]张建敏,王钢.基于WSID网络的智能监测技术的研究与实现[J].计算机技术与发展,2014,24(02):202.
ZHANG Jian-min,WANG Gang.Research and Implementation of Intelligent Monitoring Technology Based on WSID[J].,2014,24(05):202.
[5]张学军[][],马军飞[],鲁友[]. 基于位编码单元的双时隙防碰撞算法[J].计算机技术与发展,2014,24(09):93.
ZHANG Xue-jun[][],MA Jun-fei[],LU You[]. A Bi-slot Anti-collision Algorithm Based on Bits Coding Unit[J].,2014,24(05):93.
[6]姜武,杨恒新,张昀. 一种改进的查询树RFID标签防碰撞算法[J].计算机技术与发展,2015,25(02):86.
JIANG Wu,YANG Heng-xin,ZHANG Yun. An Improved Query Tree Anti-collision Algorithm in RFID Systems[J].,2015,25(05):86.
[7]张学军,常昆,王玉. 基于标签编组的RFID相互认证协议[J].计算机技术与发展,2015,25(04):102.
ZHANG Xue-jun,CHANG Kun,WANG Yu. An RFID Mutual Authentication Protocol Based on Tag Grouping[J].,2015,25(05):102.
[8]王珺吉,杜 燕,张建宏,等.智能仓储管理系统设计与实现[J].计算机技术与发展,2019,29(12):189.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 034]
WANG Jun-ji,DU Yan,ZHANG Jian-hong,et al.Design and Implementation of Intelligent Warehouse Management Information System[J].,2019,29(05):189.[doi:10. 3969 / j. issn. 1673-629X. 2019. 12. 034]
[9]孟秋云,殷宪祯,徐 鹤.基于 USRP 的无线射频识别平台设计与实现[J].计算机技术与发展,2021,31(03):168.[doi:10. 3969 / j. issn. 1673-629X. 2021. 03. 029]
MENG Qiu-yun,YIN Xian-zhen,XU He.Design and Implementation of RFID Platform Based on USRP[J].,2021,31(05):168.[doi:10. 3969 / j. issn. 1673-629X. 2021. 03. 029]
[10]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(05):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]