| ²é¿´: 366 | »Ø¸´: 1 | |||
dragsгæ (³õÈëÎÄ̳)
|
[ÇóÖú]
Çë°ïæ²éѯһÏÂÂÛÎļìË÷ÐÅÏ¢£¬Ð»Ð»¡£
|
| ICALIP2012µÄ»áÒéÂÛÎÄ£¬Ö÷°ì·½ËµÒѾ¼ìË÷£¬µ«¿àÓÚ×Ô¼ºÃ»ÓÐÌõ¼þ²éѯ£¬Çë´óϺ°ïæ²éѯһÏ£¬Ð»Ð»¡£ ÂÛÎÄÃû£ºThe Research of Security Algorithms for RF Tag |
» ²ÂÄãϲ»¶
327Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
361Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
Ò»Ö¾Ô¸ÖÐÄÏ´óѧ»¯Ñ§Ñ§Ë¶0703×Ü·Ö337Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
Ò»Ö¾Ô¸±±¾©»¯¹¤´óѧ 070300 ѧ˶ 336·Ö Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
²ÄÁÏרҵÇóµ÷¼Á
ÒѾÓÐ10È˻ظ´
341Çóµ÷¼Á(Ò»Ö¾Ô¸ºþÄÏ´óѧ070300)
ÒѾÓÐ5È˻ظ´
0854 ¿¼Ñе÷¼Á ÕÐÉúÁË£¡AI ·½Ïò
ÒѾÓÐ15È˻ظ´
384Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
ÉúÎïѧѧ˶Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
081700 µ÷¼Á 267·Ö
ÒѾÓÐ6È˻ظ´
» ±¾Ö÷ÌâÏà¹Ø¼ÛÖµÌùÍÆ¼ö£¬¶ÔÄúͬÑùÓаïÖú:
Çë°ïæ²éÕÒÒ»ÏÂÂÛÎĵÄEI¼ìË÷Çé¿ö
ÒѾÓÐ5È˻ظ´
ÇëÎÊÈçºÎ²éѯÕâ¸ö»áÒéÊÕ¼ÂÛÎÄÊÇ·ñ±»sci¼ìË÷
ÒѾÓÐ4È˻ظ´
Âé·³ÄܲéEI¼ìË÷µÄÅóÓѰïæ²éÒ»ÏÂÂÛÎļìË÷ºÅ£¬Ð»Ð»
ÒѾÓÐ6È˻ظ´
Çë¸÷λ´óÏÀ°ïæ²éÒ»ÏÂÂÛÎÄÊÇ·ñ±»¼ìË÷£¬·Ç³£Ð»Ð»À²
ÒѾÓÐ3È˻ظ´
°ïæ²éѯһÏÂISTP¼ìË÷ÂÛÎÄһƪ
ÒѾÓÐ1È˻ظ´
°ïæ²éÒ»ÏÂÂÛÎĵÄISTP¼ìË÷ºÅ£¬·Ç³£¸Ðл
ÒѾÓÐ4È˻ظ´
Çë¸ßÊÖ°ïæ²éѯÏÂÂÛÎÄÊÇ·ñEI¼ìË÷,¼ìË÷ºÅ¶àÉÙ£¬Ð»Ð»
ÒѾÓÐ7È˻ظ´
Çë¸ßÊÖ°ïæ²éѯÏÂÂÛÎÄÊÇ·ñEI¼ìË÷,¼ìË÷ºÅ¶àÉÙ£¬Ð»Ð»
ÒѾÓÐ10È˻ظ´
ÇëÇó²éѯÎÒµÄÂÛÎĵÄSCI¼ìË÷ºÅ£¬ÎÒÃÇѧУûÓÐÊý¾Ý¿â¡£
ÒѾÓÐ6È˻ظ´
Çë°ïæ²éѯÁ½»áÒéÂÛÎÄÊÇ·ñ±»ISTP¼ìË÷ÊÕ¼£¬ºÅÂëÊǶàÉÙ£¿Ôõô²éѯµÄ£¿Ð»Ð»£¡
ÒѾÓÐ10È˻ظ´
½ô¼±ÇóÖú£¬°ïæ²éÒ»ÏÂÂÛÎÄÊÇ·ñ±»SCI¼ìË÷,лл£¡
ÒѾÓÐ3È˻ظ´
ÇëÄÄλ´óÏÀ°ïæ²éһƪÎÄÕÂÊÇ·ñ±»ISTP¼ìË÷
ÒѾÓÐ5È˻ظ´
°ïæ²éÏÂÎÄÕÂÊÇ·ñ±»ISTPÊÕ¼£¿·Ç³£¸Ðл
ÒѾÓÐ7È˻ظ´
Çó°ï棬лл£¡
ÒѾÓÐ7È˻ظ´
fallsoft
½ð³æ (ÕýʽдÊÖ)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 849.1
- É¢½ð: 13
- ºì»¨: 7
- Ìû×Ó: 315
- ÔÚÏß: 86.6Сʱ
- ³æºÅ: 1548818
- ×¢²á: 2011-12-23
- ÐÔ±ð: MM
- רҵ: ¼ÆËã»úÈí¼þ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï
è¾è¾: ½ð±Ò+1, ¸ÐлӦÖú£¡ 2013-03-27 08:47:27
è¾è¾: ½ð±Ò+1, ¸ÐлӦÖú£¡ 2013-03-27 08:47:27
|
¼ìË÷ÁË Accession number: 20130315907207 Title: The research of security algorithms for RF tag Authors: Yuwulong1 ; Wengshenghui2 ; Keqinli1 Author affiliation: 1 School of Information Science and Technology, Beijing Institute of Technology, Zhuhai, Zhuhai, Guangdong, China 2 School of Computing Science, Beijing Institute of Technology, Zhuhai, Zhuhai, Guangdong, China Corresponding author: Yuwulong (drags@163.com) Source title: ICALIP 2012 - 2012 International Conference on Audio, Language and Image Processing, Proceedings Abbreviated source title: ICALIP - Int. Conf. Audio, Lang. Image Process., Proc. Monograph title: ICALIP 2012 - 2012 International Conference on Audio, Language and Image Processing, Proceedings Issue date: 2012 Publication year: 2012 Pages: 388-391 Article number: 6376648 Language: English ISBN-13: 9781467301718 Document type: Conference article (CA) Conference name: 2012 3rd IEEE/IET International Conference on Audio, Language and Image Processing, ICALIP 2012 Conference date: July 16, 2012 - July 18, 2012 Conference location: Shanghai, China Conference code: 94816 Publisher: IEEE Computer Society, 2001 L Street N.W., Suite 700, Washington, DC 20036-4928, United States Abstract: According to the protocol of ISO/IEC 14443-A, the paper accomplishes the circuit design and function test of the RF tag. As a result, the balance among area speed and power consumption is achieved. Based on the technics of 35um, the result indicates the area of 36877.75 square micron and the power consumption of 30.8458mW completely meet the performance requirement of chip. © 2012 IEEE. Number of references: 4 Main heading: Image processing Uncontrolled terms: Circuit designs - ISO/IEC - Performance requirements - Security algorithm Classification code: 741 Light, Optics and Optical Devices DOI: 10.1109/ICALIP.2012.6376648 Database: Compendex Compilation and indexing terms, © 2013 Elsevier Inc. |
2Â¥2013-03-27 07:04:18













»Ø¸´´ËÂ¥