Huo, F. ., & Gong, G. . (2014). XOR Encryption vs Phase Encryption: An In-depth Analysis. IEEE Transactions on Electromagnetic Compatibility.
Reference author: F. Huo
First name
F.
Last name
Huo
Huo, F. ., Mitran, P. ., & Gong, G. . (2016). Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems. IEEE Transactions on Information Forensics and Security, 11, 1528-1541. (Original work published 2016)
- Previous page
- Currently on page 2 2