Dale Thompson
Cited by
Cited by
Fingerprinting RFID tags
SCG Periaswamy, DR Thompson, J Di
IEEE Transactions on Dependable and Secure Computing 8 (6), 938-943, 2010
Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network
DR Thompson, GL Bilbro
IEEE Communications Letters 4 (8), 267-269, 2000
Sample-sort simulated annealing
DR Thompson, GL Bilbro
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
Mitigating power-and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic
W Cilio, M Linder, C Porter, J Di, DR Thompson, SC Smith
Microelectronics Journal 44 (3), 258-269, 2013
Identity management
CW Thompson, DR Thompson
IEEE Internet Computing 11 (3), 82-85, 2007
Poultry processing and the application of microbiome mapping
KM Feye, DR Thompson, MJ Rothrock Jr, MH Kogut, SC Ricke
Poultry science 99 (2), 678-688, 2020
Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L)
W Cilio, M Linder, C Porter, J Di, S Smith, D Thompson
Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 471-474, 2010
Fingerprinting radio frequency identification tags using timing characteristics
S Chinnappa Gounder Periaswamy, DR Thompson, HP Romero, J Di
Radio Frequency Identification System Security, 73-81, 2010
Matching electronic fingerprints of RFID tags using the hotelling's algorithm
N Saparkhojayev, DR Thompson
2009 IEEE Sensors Applications Symposium, 19-24, 2009
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
J White, D Thompson
Security and Management, 91-99, 2006
RFID technical tutorial
DR Thompson
Journal of Computing Sciences in Colleges 21 (5), 8-9, 2006
RFID technical tutorial and threat modeling
N Chaudhry, DR Thompson, C Thompson
Department of Computer Science and Computer Engineering University of …, 2005
Teaching RFID Information Systems Security
DR Thompson, J Di, MK Daugherty
Ownership Transfer of RFID Tags based on Electronic Fingerprint.
SCG Periaswamy, DR Thompson, J Di
Security and Management, 64-67, 2008
Analysis of CRC methods and potential data integrity exploits
B Maxwell, DR Thompson, G Amerson, L Johnson
International Conference on Emerging Technologies, 25-26, 2003
Student cross-training opportunities for combining food, transportation, and critical infrastructure cybersecurity into an academic food systems education program
DR Thompson, CE Rainwater, J Di, SC Ricke
Food and Feed Safety Systems and Analysis, 375-391, 2018
Categorizing RFID privacy threats with STRIDE
DR Thompson, J Di, H Sunkara, C Thompson
Proceedings ACM’s Symposium on Usable Privacy and Security held at CMU, 2006
RFID technical tutorial and threat modeling version 1.0
N Chaudhry, DR Thompson, CW Thompson
Department of Computer Science and Computer Engineering, 2005
Survey analysis of computer science, food science, and cybersecurity skills and coursework of undergraduate and graduate students interested in food safety
KM Feye, H Lekkala, JA Lee‐Bartlett, DR Thompson, SC Ricke
Journal of Food Science Education 19 (4), 240-249, 2020
Pendulum: an energy efficient protocol for wireless sensor networks
A Baha'A, DR Thompson
2010 IEEE Sensors Applications Symposium (SAS), 273-277, 2010
The system can't perform the operation now. Try again later.
Articles 1–20