Chai, Q., & Gong, G. (2010). A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper)
References
Filter by:
Fan, X., Gong, G., Lauffenburger, K., & Hicks, T. (2010). FPGA Implementations of the Hummingbird Cryptographic Algorithm California, USA. (Original work published 2010)
Yu, N., & Gong, G. (2010). Multiplicative characters, the Weil bound, and polyphase sequence families with low correlation IEEE Transactions on Information Theory, 56, 1702-1713. (Original work published 2010)
Wen, H., Gong, G., & Ho, P. (2010). MIMO Cross-Layer Secure Communication Architecture Based on STBC Miami, Florida, USA. (Original work published 2010)
Li, Z., & Gong, G. (2009). Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks Macau SAR, P.R.C.
Hu, H., Gong, G., & Feng, D. (2009). New results on periodic sequences with large k-error linear complexity IEEE Transactions on Information Theory.
Li, Z., & Gong, G. (2009). DHT-Based Detection of Node Clone in Wireless Sensor Networks Niagara Falls, Ontario, Canada.
Wang, Z., & Gong, G. (2009). New sequences design from Weil representation with low two-dimensional correlation in both time and phase shifts Seoul, Korea.
Fan, X., Hu, H., Gong, G., Smith, E., & Engels, D. (2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC\textquoteright09) London, UK. (Original work published 2009)
Yu, N., & Gong, G. (2009). Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences Springer. (Original work published 2009)