[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[3] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[4] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[5] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[6] |
LI Yan-mei1, YIN Xin-chun1,2,SHAO Meng-li2.
Multi-scalar Multiplication Algorithm for Elliptic Curve Based on MBNS and Sliding Window
[J]. Computer and Modernization, 2019, 0(01): 11-.
|
[7] |
HUANG Yujie, TANG Zuoqi.
Information Security Risk Assessment Based on Improved Bayesian Network Model
[J]. Computer and Modernization, 2018, 0(04): 95-.
|
[8] |
WEN He-ping1, BAO Jing-jing2, KE Ju-xin1, LIU Shu-wei1.
Design of Hyperchaotic Lorenz Encryption Algorithm Based on Hadoop
[J]. Computer and Modernization, 2018, 0(03): 108-.
|
[9] |
MAO Yu-fang, DENG Lun-zhi.
An Identity-based Blind Signature Scheme and Its Security Proof
[J]. Computer and Modernization, 2017, 0(4): 105-108.
|
[10] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[11] |
HU Jiang-hong.
A Certificateless Broadcasting Multi-proxy Signature Scheme Based on RSA
[J]. Computer and Modernization, 2016, 0(6): 113-116.
|
[12] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|
[13] |
LIU Yu1,2, CAI Jun-tao2, LAI Shun-qiao2, XIAO Yi-lin2.
Road Lighting Intelligent Management System Based on MVC and Entity Framework
[J]. Computer and Modernization, 2015, 0(10): 64-68.
|
[14] |
HAN Lifeng.
Mobile Client of Campus Card Based on ASP.NET Web API Framework
[J]. Computer and Modernization, 2014, 0(9): 128-131.
|
[15] |
LIU Yi-lu, LIAO Xiao-feng, LIANG Yi-feng.
An Improved Scheme for Neural Synchronization Based on Tree Parity Machine
[J]. Computer and Modernization, 2014, 0(5): 47-51.
|