[1] |
DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao.
Zero-trust Dynamic Evaluation Method for IoT Terminals
[J]. Computer and Modernization, 2024, 0(11): 41-45.
|
[2] |
ZHU Ke1, XUAN Jiaxing2, XUE Wenhao2.
An Electronic License Access Control Method Based on Aggregation and Association of Smart Contracts
[J]. Computer and Modernization, 2024, 0(06): 103-108.
|
[3] |
FAN Na, ZOU Xiao-min, LI Si-rui, YANG Xiao-duo.
A Trusted Computing Based Secure Scheme in Vehicular Named Data Networking
[J]. Computer and Modernization, 2023, 0(02): 96-103.
|
[4] |
GAO Feng, ZHUANG Yi, LIU Xiao.
A Trusted Transmission Scheme of SDN Based on Path Tracking Feedback
[J]. Computer and Modernization, 2022, 0(12): 102-110.
|
[5] |
MAO Ming-yang, XU Sheng-chao.
Communication Terminal Attack Behavior Identification Algorithm Based on Trusted Cloud Computing#br#
[J]. Computer and Modernization, 2022, 0(11): 37-42.
|
[6] |
LIU Guo-li, XU Hong-nan, TAN You-qian.
Collaborative Filtering Recommendation Algorithm Combined with Expert Trust
[J]. Computer and Modernization, 2022, 0(11): 60-68.
|
[7] |
YAO Zheng.
Privacy Protection Model for Medical Data Based on HISPAC
[J]. Computer and Modernization, 2022, 0(09): 1-12.
|
[8] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[9] |
ZUO Peng, HE Zhi-mou, YUAN Meng, ZHANG Hai-kuo, YANG Wei-ping.
Identifier Resolution Model Based on Encryption Transmission
[J]. Computer and Modernization, 2020, 0(04): 46-.
|
[10] |
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2.
Trusted Secure Access Scheme of Ubiquitous Power IoT
[J]. Computer and Modernization, 2020, 0(04): 52-.
|
[11] |
ZHANG Peng, ZHOU Liang.
Trust-based Dynamic Multi-level Access Control Model
[J]. Computer and Modernization, 2019, 0(07): 116-.
|
[12] |
LIAN Geng-xiong .
Trusted Mobile Application Market Based on Blockchain
[J]. Computer and Modernization, 2019, 0(03): 58-.
|
[13] |
LIANG Yi, HAN Li-xin.
A Mass Diffusion Recommender Algorithm with User Trust Network
[J]. Computer and Modernization, 2018, 0(02): 12-16.
|
[14] |
REN Mengchen1, LIU Guangjie1, LIU Weiwei1, ZHAI Jiangtao2, DAI Yuewei1,2.
A Social Psychology Trust Model for P2P Network
[J]. Computer and Modernization, 2017, 0(8): 104-.
|
[15] |
MA Ming-yang.
SMS Encryption Scheme for Smartphones Based on Trusted Hardware
[J]. Computer and Modernization, 2016, 0(4): 29-35.
|