Chai, Q., & Gong, G. (2010). A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting (Full Paper)
References
Filter by:
2010
Fan, X., Gong, G., Lauffenburger, K., & Hicks, T. (2010). FPGA Implementations of the Hummingbird Cryptographic Algorithm California, USA. (Original work published 2010)
Tang, X., & Gong, G. (2010). New constructions of binary sequences with optimal autocorrelation value/magnitude IEEE Transactions on Information Theory, 56, 1278-1286. (Original work published 2010)
Wen, H., Gong, G., & Ho, P. (2010). MIMO Cross-Layer Secure Communication Architecture Based on STBC Miami, Florida, USA. (Original work published 2010)
2009
Li, Z., & Gong, G. (2009). Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks Macau SAR, P.R.C.
Li, Z., & Gong, G. (2009). DHT-Based Detection of Node Clone in Wireless Sensor Networks Niagara Falls, Ontario, Canada.
Fan, X., Hu, H., Gong, G., Smith, E., & Engels, D. (2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller, to appear in the Proceedings of The 1st International Workshop on RFID Security and Cryptography 2009 (RISC\textquoteright09) London, UK. (Original work published 2009)
Nawaz, Y., Gupta, K. C., & Gong, G. (2009). Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction IEEE Transactions on Information Theory. (Original work published 2009)
Yu, N., & Gong, G. (2009). Multiplexing realizations of the decimation-Hadamard transform of two-level autocorrelation sequences Springer. (Original work published 2009)
Wen, H., Gong, G., & H, P. (2009). Build-in Wiretap Channel I with Feedback and LDPC Codes JOURNAL OF COMMUNICATIONS AND NETWORKS, 11, 538-543.