Computer and Modernization ›› 2024, Vol. 0 ›› Issue (01): 13-20.doi: 10.3969/j.issn.1006-2475.2024.01.003
Previous Articles Next Articles
Online:
2024-01-23
Published:
2024-02-23
CLC Number:
HAN Kun, WANG Zheng, DUAN Jun-yong, YANG Hua-lin. Overview of Data Processing Techniques for MIoT Based on Fog Computing[J]. Computer and Modernization, 2024, 0(01): 13-20.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2024.01.003
[1] CARVALHO N, CHAIM O, CAZARINI E, et al. Manufacturing in the fourth industrial revolution:A positive prospect in sustainable manufacturing[J]. Procedia Manufacturing, 2018,21(4):671-678. |
[1] | LIU Zheng, WU Ke-hua, YE Chun-xiao. Security-enhanced Data Access Control for Multi-authority Cloud Storage [J]. Computer and Modernization, 2021, 0(10): 119-126. |
[2] | QIN Lu-lu, ZHOU Li-jing, WANG Min. A Conditional Proxy Re-encryption Supporting Multi-keyword Search [J]. Computer and Modernization, 2020, 0(01): 100-. |
[3] | FANG Zhou, CHENG Qing, PEI Xu-bin . Data Security Protection of Electricity Marketing Information System [J]. Computer and Modernization, 2019, 0(03): 111-. |
[4] | WEN He-ping1, BAO Jing-jing2, KE Ju-xin1, LIU Shu-wei1. Design of Hyperchaotic Lorenz Encryption Algorithm Based on Hadoop [J]. Computer and Modernization, 2018, 0(03): 108-. |
[5] | LI Xue-si, WANG Hong, WU Fei, LIN Ji-nan. Implementation of Incremental Backup Based on Oracle Materialized View [J]. Computer and Modernization, 2014, 0(1): 168-170. |
[6] | SUN Ping-ping. Design and Realization of Database Encryption Server Based on Table Fields [J]. Computer and Modernization, 2009, 1(11): 6-11,1. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||