Fingerprinting RFID tags SCG Periaswamy, DR Thompson, J Di IEEE Transactions on Dependable and Secure Computing 8 (6), 938-943, 2010 | 107 | 2010 |
Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network DR Thompson, GL Bilbro IEEE Communications Letters 4 (8), 267-269, 2000 | 61 | 2000 |
Sample-sort simulated annealing DR Thompson, GL Bilbro IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005 | 57 | 2005 |
Mitigating power-and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic W Cilio, M Linder, C Porter, J Di, DR Thompson, SC Smith Microelectronics Journal 44 (3), 258-269, 2013 | 42 | 2013 |
Identity management CW Thompson, DR Thompson IEEE Internet Computing 11 (3), 82-85, 2007 | 31 | 2007 |
Poultry processing and the application of microbiome mapping KM Feye, DR Thompson, MJ Rothrock Jr, MH Kogut, SC Ricke Poultry science 99 (2), 678-688, 2020 | 25 | 2020 |
Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L) W Cilio, M Linder, C Porter, J Di, S Smith, D Thompson Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 471-474, 2010 | 22 | 2010 |
Fingerprinting radio frequency identification tags using timing characteristics S Chinnappa Gounder Periaswamy, DR Thompson, HP Romero, J Di Radio Frequency Identification System Security, 73-81, 2010 | 20 | 2010 |
Matching electronic fingerprints of RFID tags using the hotelling's algorithm N Saparkhojayev, DR Thompson 2009 IEEE Sensors Applications Symposium, 19-24, 2009 | 19 | 2009 |
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. J White, D Thompson Security and Management, 91-99, 2006 | 17 | 2006 |
RFID technical tutorial DR Thompson Journal of Computing Sciences in Colleges 21 (5), 8-9, 2006 | 16 | 2006 |
RFID technical tutorial and threat modeling N Chaudhry, DR Thompson, C Thompson ver. 1.0, tech. report, 2005 | 13 | 2005 |
Teaching RFID Information Systems Security DR Thompson, J Di, MK Daugherty | 12 | 2014 |
Ownership Transfer of RFID Tags based on Electronic Fingerprint. SCG Periaswamy, DR Thompson, J Di Security and Management, 64-67, 2008 | 12 | 2008 |
Analysis of CRC methods and potential data integrity exploits B Maxwell, DR Thompson, G Amerson, L Johnson International Conference on Emerging Technologies, 25-26, 2003 | 11 | 2003 |
Student cross-training opportunities for combining food, transportation, and critical infrastructure cybersecurity into an academic food systems education program DR Thompson, CE Rainwater, J Di, SC Ricke Food and Feed Safety Systems and Analysis, 375-391, 2018 | 9 | 2018 |
Survey analysis of computer science, food science, and cybersecurity skills and coursework of undergraduate and graduate students interested in food safety KM Feye, H Lekkala, JA Lee‐Bartlett, DR Thompson, SC Ricke Journal of Food Science Education 19 (4), 240-249, 2020 | 8 | 2020 |
Categorizing RFID privacy threats with STRIDE DR Thompson, J Di, H Sunkara, C Thompson Proceedings ACM’s Symposium on Usable Privacy and Security held at CMU, 2006 | 8 | 2006 |
RFID technical tutorial and threat modeling version 1.0 N Chaudhry, DR Thompson, CW Thompson Department of Computer Science and Computer Engineering, 2005 | 8 | 2005 |
Pendulum: an energy efficient protocol for wireless sensor networks A Baha'A, DR Thompson 2010 IEEE Sensors Applications Symposium (SAS), 273-277, 2010 | 7 | 2010 |