[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[3] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[4] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[5] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[6] |
HUANG Yujie, TANG Zuoqi.
Information Security Risk Assessment Based on Improved Bayesian Network Model
[J]. Computer and Modernization, 2018, 0(04): 95-.
|
[7] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[8] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|
[9] |
YANG Yun-ping, WU Zhi-jun.
Application of Apache Shiro Security Framework in Technology Transfer Services System
[J]. Computer and Modernization, 2014, 0(3): 158-160.
|
[10] |
PU Lin.
Identity Authentication Service Based on Restful
[J]. Computer and Modernization, 2014, 0(3): 165-168.
|
[11] |
YIN Bo;CHEN Lu;CHEN Liang;WANG Yu-fei.
Application of Information Security Key Technologies for Smart Grid in Sino-Singapore Tianjin Eco-city
[J]. Computer and Modernization, 2013, 1(9): 186-189.
|
[12] |
TAN Ying.
Comparative Study of Information Hiding Method Based on Text Typesetting Format
[J]. Computer and Modernization, 2013, 1(6): 52-56.
|
[13] |
LIU Jinsuo;CONG Zhenghai;HAN Yong.
Design and Implementation of Enterprise Data Protection and Leakage Proof Platform
[J]. Computer and Modernization, 2013, 1(6): 48-51.
|
[14] |
WAN Zhong-bao;JI Miao-wei.
An Improved Group Blind Signature Scheme
[J]. Computer and Modernization, 2013, 1(5): 99-102.
|
[15] |
YANG Long-ping;XU Yi-lu.
Influence of Two Kinds of Self-organization Function for Assessment of Information Security Asset Value
[J]. Computer and Modernization, 2013, 218(10): 102-105.
|