Följ
Dale Thompson
Dale Thompson
Professor, Computer Science and Computer Engineering, University of Arkansas
Verifierad e-postadress på uark.edu - Startsida
Titel
Citeras av
Citeras av
År
Fingerprinting RFID tags
SCG Periaswamy, DR Thompson, J Di
IEEE Transactions on Dependable and Secure Computing 8 (6), 938-943, 2010
1072010
Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network
DR Thompson, GL Bilbro
IEEE Communications Letters 4 (8), 267-269, 2000
612000
Sample-sort simulated annealing
DR Thompson, GL Bilbro
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
572005
Mitigating power-and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic
W Cilio, M Linder, C Porter, J Di, DR Thompson, SC Smith
Microelectronics Journal 44 (3), 258-269, 2013
422013
Identity management
CW Thompson, DR Thompson
IEEE Internet Computing 11 (3), 82-85, 2007
312007
Poultry processing and the application of microbiome mapping
KM Feye, DR Thompson, MJ Rothrock Jr, MH Kogut, SC Ricke
Poultry science 99 (2), 678-688, 2020
252020
Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L)
W Cilio, M Linder, C Porter, J Di, S Smith, D Thompson
Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 471-474, 2010
222010
Fingerprinting radio frequency identification tags using timing characteristics
S Chinnappa Gounder Periaswamy, DR Thompson, HP Romero, J Di
Radio Frequency Identification System Security, 73-81, 2010
202010
Matching electronic fingerprints of RFID tags using the hotelling's algorithm
N Saparkhojayev, DR Thompson
2009 IEEE Sensors Applications Symposium, 19-24, 2009
192009
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
J White, D Thompson
Security and Management, 91-99, 2006
162006
RFID technical tutorial
DR Thompson
Journal of Computing Sciences in Colleges 21 (5), 8-9, 2006
152006
RFID technical tutorial and threat modeling
N Chaudhry, DR Thompson, C Thompson
ver. 1.0, tech. report, 2005
132005
Teaching RFID Information Systems Security
DR Thompson, J Di, MK Daugherty
122014
Ownership Transfer of RFID Tags based on Electronic Fingerprint.
SCG Periaswamy, DR Thompson, J Di
Security and Management, 64-67, 2008
122008
Analysis of CRC methods and potential data integrity exploits
B Maxwell, DR Thompson, G Amerson, L Johnson
International Conference on Emerging Technologies, 25-26, 2003
112003
Student cross-training opportunities for combining food, transportation, and critical infrastructure cybersecurity into an academic food systems education program
DR Thompson, CE Rainwater, J Di, SC Ricke
Food and Feed Safety Systems and Analysis, 375-391, 2018
92018
Survey analysis of computer science, food science, and cybersecurity skills and coursework of undergraduate and graduate students interested in food safety
KM Feye, H Lekkala, JA Lee‐Bartlett, DR Thompson, SC Ricke
Journal of Food Science Education 19 (4), 240-249, 2020
82020
Categorizing RFID privacy threats with STRIDE
DR Thompson, J Di, H Sunkara, C Thompson
Proceedings ACM’s Symposium on Usable Privacy and Security held at CMU, 2006
82006
RFID technical tutorial and threat modeling version 1.0
N Chaudhry, DR Thompson, CW Thompson
Department of Computer Science and Computer Engineering, 2005
82005
Ransomware and malware sandboxing
B Denham, DR Thompson
2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile …, 2022
62022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20