Computer Science ›› 2019, Vol. 46 ›› Issue (4): 137-143.doi: 10.11896/j.issn.1002-137X.2019.04.022
• Information Security • Previous Articles Next Articles
LIU Meng-jun1,3, SHA Tao1, LI Dan2, LIU Shu-bo2
CLC Number:
[1]XV C E,XV F,LI X H,et al.Design of campus comprehensive access management platform[J].Journal on Communications,2013,34(S2):141-147.(in Chinese) 许彩娥,徐锋,厉晓华,等.校园综合门禁管理平台的设计[J].通信学报,2013,34(S2):141-147. [2]ZHU H J,PAN Z F,ZHU Y L.“Internet+” intelligent access control system[J].Application of Electronic Technique,2017,43(3):124-126,131.(in Chinese) 朱航江,潘振福,朱永利.“互联网+”智能门禁控制系统[J].电子技术应用,2017,43(3):124-126,131. [3]NOUR K,MONA J,ZAHER D.Measurement-Based Signaling Management Strategies for Cellular IoT[J].IEEE Internet of Things Journal,2017,4(5):1434-1444. [4]LIU Q,CUI L,CHEN H M.Key Technologies and Applications of Internet of Things[J].Computer Science,2010,37(6):1-4,10.(in Chinese) 刘强,崔莉,陈海明.物联网关键技术与应用[J].计算机科学,2010,37(6):1-4,10. [5]ZHAO Z J,SHEN Q,TANG H,et al.Theory and Key Techno- logies of Architecture and Intelligent Information Processing for Internet of Things[J].Computer Science,2011,38(8):1-8.(in Chinese) 赵志军,沈强,唐晖,等.物联网架构和智能信息处理理论与关键技术[J].计算机科学,2011,38(8):1-8. [6]LUAN L X.Intelligent electronic door lock system based on GPRS and laser virtual keyboard[J].Journal of Computer Applications,2016,36(S2):319-321.(in Chinese) 栾禄祥.基于GPRS和激光虚拟键盘的智能电子门锁系统[J].计算机应用,2016,36(S2):319-321. [7]PIAO Y,KIM J U,TARIQ U,et al.Polynomial-based key ma- nagement for secure intra-group and inter-group communication[J].Computers & Mathematics with Applications,2013,65(9):1300-1309. [8]LI Y N,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update [J].Future Generation Computer Systems,2018,76(2):789-798. [9]LUCA R,FRANCESCO M,JUSSI K,et al.A Semantic Publish-Subscribe Architecture for the Internet of Things[J].IEEEInternet of Things Journal,2016,3(6):1274-1296. [10]MARC B,ALEJANDRO C,JAIME L,et al.IoT-Cloud Service Optimization in Next Generation Smart Environments[J].Future Generation Computer Systems,2016,34(12):4077-4090. [11]ZHAO X,WU M Q,CHEN D X,et al.An Adaptive Re-Keying Mechanism for Secure Multicast[J].Acta Electronica Sinica,2003,31(5):654-658.(in Chinese) 赵欣,吴敏强,陈道蓄,等.一个自适应的安全组通信密钥更新算法[J].电子学报,2003,31(5):654-658. [12]JIN C,WEI D X,LOW S H,et al.FAST TCP:motivation,architecture,algorithms,performance[J].IEEE/ACM Transactions on Networking,2006,14(6):1246-1259. [13]XU L S,HARFOUSH K,RHEE I.Binary increase congestion control (BIC) for fast long-distance networks[C]∥Proc. of IEEE INFOCOM.2004:2514-2524. [14]HE E,LEIGH J,YU O,et al.Reliable blast UDP:predictable high performance bulk data transfer[C]∥Proc. of IEEE International Conference on Cluster Computing.2002:317-324. [15]GU Y H,GROSSMAN R L.UDT:UDP-based data transfer for high-speed wide area networks[J].Computer Networks,2007,51(7):1777-1799. [16]LIU X Z,ZHOU J,LIANG D Q.Huge Data Blocks Transmission Based on UDP[J].Telecommunication Engineering,2012,52(1):96-100.(in Chinese) 刘喜作,周晶,梁德清.基于UDP的大数据包可靠传输[J].电讯技术,2012,52(1):96-100. [17]LI Y M,REN Y M,LI J.Comparison and evaluation of UDP-based transport protocol performance[J].Application Research of Computers,2010,27(5):3096-3910.(in Chinese) 李一鸣,任勇毛,李俊.基于UDP的传输协议性能比较与分析[J].计算机应用研究,2010,27(5):3096-3910. [18]HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in sounds and images[C]∥Proc. of the 6th International Conference on Information Assurance and Security.2010:28-31. [19]XIAO C L,ZHOU D Y,ZHANG K.CUDA based high-efficiency implementation of AES algorithm[J].Application Research of Computers,2013,30(6):1907-1909.(in Chinese) 夏春林,周德云,张堃.AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):1907-1909. |
[1] | SHEN Jia-fang, QIAN Li-ping, YANG Chao. Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks [J]. Computer Science, 2022, 49(5): 279-286. |
[2] | WU Shao-qian, LI Xi-ming. Authenticable Encrypted Secure Communication Based on Adversarial Network [J]. Computer Science, 2021, 48(5): 328-333. |
[3] | ZHANG Jie, LIANG Jun-bin, JIANG Chan. Research Progress on Key Technologies of Data Storage Based on Wireless Sensor Networks inWide-Area Complex Fluid Systems [J]. Computer Science, 2020, 47(5): 242-249. |
[4] | WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9. |
[5] | BAI Ruo-chen, PANG Chen-xin, JIA Jia, QIU Shu-guang, SHAO Jia, LU Xiao-jiao. Design of Cloud Platform for Energy Internet of Things Based on LPWAN Multi-protocol [J]. Computer Science, 2019, 46(6A): 589-592. |
[6] | ZHANG Ting, ZHANG De-gan, CUI Yu-ya, CHEN Lu, GE Hui. New Method of Multi-path Reliable Transmission Based on Redundancy Strategy [J]. Computer Science, 2019, 46(11A): 363-368. |
[7] | XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140. |
[8] | LIN Cheng-kuan, ZHAO Yuan, FAN Jian-xi and CHENG Bao-lei. Research on Completely Independent Spanning Trees Based on Degree of Vertices [J]. Computer Science, 2017, 44(6): 94-96. |
[9] | CHAI Hong-yu and ZANG Hong-yan. Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems [J]. Computer Science, 2016, 43(8): 100-104. |
[10] | CHAI Xiu-li and GAN Zhi-hua. New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System [J]. Computer Science, 2016, 43(4): 134-139. |
[11] | LI Yan, WANG Cheng and FENG Xian-ju. Probability Routing Protocol Based on Delay Tolerant in Wireless Body Area Network [J]. Computer Science, 2015, 42(Z6): 274-275. |
[12] | CHAI Xiu-li and GAN Zhi-hua. Self-adaptive Bit-level Colour Image Encryption Algorithm Based on Spatiotemporal Chaotic System [J]. Computer Science, 2015, 42(7): 204-209. |
[13] | ZHU Xiao-juan,LU Yang,QIU Shu-wei and GUAN Jun-ming. Survey of Data Transmission Reliability in Wireless Sensor Networks [J]. Computer Science, 2013, 40(9): 1-7. |
[14] | . Analysise and Realization of Micro-satellite Communication Based on UDP Protocol [J]. Computer Science, 2013, 40(1): 22-25. |
[15] | . Study and Implementation of Data Transfer System in Experiment of High Energy Physics [J]. Computer Science, 2012, 39(Z6): 93-95. |
|