[1] |
ZHANG Simin, LIU Xinmei, YIN Junling, LI Baoling.
PCB Defect Detection Method Based on Improved YOLOv7
[J]. Computer and Modernization, 2024, 0(12): 45-52.
|
[2] |
ZHU Ke1, XUAN Jiaxing2, XUE Wenhao2.
An Electronic License Access Control Method Based on Aggregation and Association of Smart Contracts
[J]. Computer and Modernization, 2024, 0(06): 103-108.
|
[3] |
LI Wang-wang, HUANG Xue-jun.
Design Scheme of User Clustering and Power Distribution for Millimeter-Wave Massive#br#
MIMO-NOMA Systems#br#
[J]. Computer and Modernization, 2024, 0(02): 29-35.
|
[4] |
Gulbostan Akim, Nurmamat Helil.
ABAC Decision Recycling with Dynamic Policy Change
[J]. Computer and Modernization, 2022, 0(10): 47-54.
|
[5] |
JI Yuan, ZHENG Wei-bo, WANG Zi, .
Virtualization of Secure Access Device Based on Container
[J]. Computer and Modernization, 2022, 0(09): 106-110.
|
[6] |
LIU Zheng, WU Ke-hua, YE Chun-xiao.
Security-enhanced Data Access Control for Multi-authority Cloud Storage
[J]. Computer and Modernization, 2021, 0(10): 119-126.
|
[7] |
LI Wen-quan, XU Su-ping.
Tourism Resource Information Database System Based on Geographic Information
[J]. Computer and Modernization, 2021, 0(08): 100-103.
|
[8] |
LIU Xue-zhen, CUI Yan, DENG Xiao-fei, PENG Jie.
An Efficient Attribute Revocation Scheme of Supporting Rights Management
[J]. Computer and Modernization, 2021, 0(07): 95-101.
|
[9] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[10] |
SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei.
Internet of Things Access Control System Based on Blockchain
[J]. Computer and Modernization, 2020, 0(11): 100-108.
|
[11] |
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2.
Trusted Secure Access Scheme of Ubiquitous Power IoT
[J]. Computer and Modernization, 2020, 0(04): 52-.
|
[12] |
LI Hua-ying, LIU Li, LIU Yi-jing.
Resource Location Technology for Software Ecosystem
[J]. Computer and Modernization, 2020, 0(03): 24-.
|
[13] |
TANG Zi-zhuo1, WU Ke-he1, LI Wei1, ZHANG Xian-kang2, CUI A-jun2.
Research and Implementation of Security Access System for #br# Video Terminal Based on Business Secret Algorithm
[J]. Computer and Modernization, 2020, 0(02): 46-.
|
[14] |
QIN Lu-lu, ZHOU Li-jing, WANG Min.
A Conditional Proxy Re-encryption Supporting Multi-keyword Search
[J]. Computer and Modernization, 2020, 0(01): 100-.
|
[15] |
MIAO Si-wei1, YU Wen-hao1, YAO Feng2, GAO Jing3.
Security Analysis for PLC Access Control
[J]. Computer and Modernization, 2019, 0(09): 41-.
|