-
1
-
-
2542625540
-
Color and Texture Analysis Based Vehicle License Plate Location
-
GUO Jie, SHI Peng-fei. "Color and Texture Analysis Based Vehicle License Plate Location". Journal of Image and Graphics (A), 2002, 7(5), pp.472-476
-
(2002)
Journal of Image and Graphics (A)
, vol.7
, Issue.5
, pp. 472-476
-
-
Jie, G.U.O.1
Peng-fei, S.H.I.2
-
2
-
-
0042664743
-
A Kind of Segmentation Method of Vehicle-License-Plate Images Based on Wavelet and Mathematical Morphology
-
DAI Qing-yun, YU Ying-lin. "A Kind of Segmentation Method of Vehicle-License-Plate Images Based on Wavelet and Mathematical Morphology". Journal of Image and Graphics, 2000, 5(5), pp.411-415
-
(2000)
Journal of Image and Graphics
, vol.5
, Issue.5
, pp. 411-415
-
-
Qing-yun, D.A.I.1
Ying-lin, Y.U.2
-
3
-
-
54249144231
-
Segmenting Characters of License Plate by Hough Transformation and the Prior Knowledge
-
ZHANG Yun-gang, ZHANG Chang-shui. "Segmenting Characters of License Plate by Hough Transformation and the Prior Knowledge". Chinese Journal of Computers. 2004, 27(1), pp.130-135
-
(2004)
Chinese Journal of Computers
, vol.27
, Issue.1
, pp. 130-135
-
-
ZHANG, Y.-G.1
ZHANG, C.-S.2
-
4
-
-
57849130359
-
The principle and application of a UHF & microwave RFID tag-chip
-
CHEN Liang-lun, LIU Xue-gang. "The principle and application of a UHF & microwave RFID tag-chip". Control & Automation.2006, 22(9Z), pp. 182-184
-
Control & Automation.2006
, vol.22
, Issue.9 Z
, pp. 182-184
-
-
Liang-lun, C.H.E.N.1
Xue-gang, L.I.U.2
-
6
-
-
35248872610
-
RFID systems and security and privacy implications
-
Kaliski B. S, Koc C. K, Paar C. eds, Berlin: Springer-Verlag
-
Sarma S. E., Weis S. A., Engels D. W., "RFID systems and security and privacy implications". In: Kaliski B. S., Koc C. K., Paar C. eds., Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002). Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003, pp.454-469
-
(2003)
Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002). Lectures Notes in Computer Science
, vol.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
7
-
-
33744950331
-
Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID
-
Sendai
-
Ohkubo M., Suzuki K., Kinoshita S., "Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID". In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004, pp.719-724
-
(2004)
Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS
, pp. 719-724
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
8
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Washington, DC, USA
-
Henrici D., Muller P., "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers". In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04), Washington, DC, USA, 2004, pp. 149-153
-
(2004)
Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04)
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
9
-
-
24644501824
-
-
Rhee K., Kwak J., Kim S., Won D., Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter D., Ullmann M. eds., Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 345O.Berlin: Springer2Verlag, 2005, pp.70-84
-
Rhee K., Kwak J., Kim S., Won D., "Challenge-response based RFID authentication protocol for distributed database environment". In: Hutter D., Ullmann M. eds., Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 345O.Berlin: Springer2Verlag, 2005, pp.70-84
-
-
-
-
10
-
-
35048904109
-
-
Saito J., Ryou J. C., Sakurai K., Enhancing privacy of universal re-encryption scheme for RFID tags. In: Yang L. T., Guo M., Gao G. R., J ha N. K. eds., Proceedings oft he International Conference on Embedded and Ubiquitous Computing(EUC 2004). Lectures Notes in Computer Science 3207. Berlin: Springer-Verlag, 2004, pp. 879-890
-
Saito J., Ryou J. C., Sakurai K., "Enhancing privacy of universal re-encryption scheme for RFID tags". In: Yang L. T., Guo M., Gao G. R., J ha N. K. eds., Proceedings oft he International Conference on Embedded and Ubiquitous Computing(EUC 2004). Lectures Notes in Computer Science 3207. Berlin: Springer-Verlag, 2004, pp. 879-890
-
-
-
-
11
-
-
57849164562
-
Study of Security and Privacy Aspects in RFID System
-
WANG Lian-qiang, LV Shu-wang, HAN Xiao-xi. "Study of Security and Privacy Aspects in RFID System". Application Research of Computers.2006, 23(6), pp. 16-18
-
(2006)
Application Research of Computers
, vol.23
, Issue.6
, pp. 16-18
-
-
Lian-qiang, W.A.N.G.1
Shu-wang, L.V.2
Xiao-xi, H.A.N.3
-
12
-
-
57849169427
-
-
ZHANG Jian-wei, LI Xin, ZHANG Mei-feng. Study and Realization of Authentication Technique Based on MD5 Algorithm. Computer Engineer. 2003, 29(4), pp.118-119, 145
-
ZHANG Jian-wei, LI Xin, ZHANG Mei-feng. "Study and Realization of Authentication Technique Based on MD5 Algorithm". Computer Engineer. 2003, 29(4), pp.118-119, 145
-
-
-
-
13
-
-
57849166328
-
MD5 Algorithm and the Application in Distanced-identity Authentication
-
BAI Yin, LI Zhi-shu, ZHU Xing-dong. "MD5 Algorithm and the Application in Distanced-identity Authentication". Journal of Sichuan University (Natural Science Edition). 2006, 43(2), pp.305-309
-
(2006)
Journal of Sichuan University (Natural Science Edition)
, vol.43
, Issue.2
, pp. 305-309
-
-
Yin, B.A.I.1
Zhi-shu, L.I.2
Xing-dong, Z.H.U.3
|