[1] |
MA Huiping1, LI Peng1, 2, HU Sujun1.
Security Game Analysis Model of RFID System Based on Bayesian Attack Graph
[J]. Computer and Modernization, 2024, 0(07): 93-99.
|
[2] |
JI Yuan, ZHENG Wei-bo, WANG Zi, .
Virtualization of Secure Access Device Based on Container
[J]. Computer and Modernization, 2022, 0(09): 106-110.
|
[3] |
YOU Qiang-zhi, HU Huai-xiang, CHEN Xiang-yu.
Fast Memory Synchronization Technology for Container Thermal Migration
[J]. Computer and Modernization, 2022, 0(01): 17-22.
|
[4] |
XUE Wei-lian, LI Xue-jiao, CHEN Jie.
A Multi-period Anti-collision Tree Search Algorithm Based on ALOHA Partition
[J]. Computer and Modernization, 2021, 0(11): 95-99.
|
[5] |
ZHOU Jing , , DONG Guo-chao , , DENG Zu-qiang , , ZHANG Jin-luan , , LIU Chao , , NIU Yong-liang .
Two-way Security Authentication RFID Protocol Based on Random Hash Chain
[J]. Computer and Modernization, 2021, 0(03): 46-50.
|
[6] |
DENG Zu-qiang, LIU Chao, ZHOU Jing, ZHANG Jin-luan, DONG Guo-chao, .
Design of RFID Power Tag for Electrical Equipment Against Electromagnetic Interference
[J]. Computer and Modernization, 2021, 0(01): 12-16.
|
[7] |
ZHANG Zi-ye1, LIU Yu-long1, HU Bei2 .
Multi-source Data Integration Method Based on Data Virtualization Technology
[J]. Computer and Modernization, 2019, 0(11): 18-.
|
[8] |
JIAN Bi-yuan1, WANG Hai-tao2, LIU Dao-wei1.
A RFID Mutual-authentication Protocol
[J]. Computer and Modernization, 2017, 0(7): 107-110.
|
[9] |
WEI Shu-min, ZHANG Yong-hua, SHANG Yu-fang.
Research and Design of Lightweight Mobile RFID Authentication Protocol
[J]. Computer and Modernization, 2016, 0(11): 74-78.
|
[10] |
CHU Guiyang.
A Low Cost Secure Ownership Transferring Method of RFID Network
[J]. Computer and Modernization, 2016, 0(10): 84-87.
|
[11] |
CAI Dong-jiao.
Application of Virtualization Technology in Experiment Teaching
[J]. Computer and Modernization, 2015, 0(11): 109-112.
|
[12] |
FENG Hui-ying, ZHOU Liang.
Adaptive RFID Data Cleaning Algorithm Based on Sliding-window
[J]. Computer and Modernization, 2015, 0(1): 31-36.
|
[13] |
LIN Ji-yan1, LI Yao2.
RFID Tags of Drunk Driving Monitoring Systems Vehicle-mounted Terminal
[J]. Computer and Modernization, 2015, 0(1): 109-112.
|
[14] |
SHEN Qingguo, HUANG Liaoruo, LUO Jian.
Analyses of Softwaredefined Network and Its Application
[J]. Computer and Modernization, 2014, 0(4): 133-137.
|
[15] |
ZHANG Yu-chen, ZHANG Xiao-fang.
Performance Test of x86-based Server Virtualization Platform
[J]. Computer and Modernization, 2014, 0(2): 32-35+40.
|