Computer Science ›› 2016, Vol. 43 ›› Issue (4): 145-149.doi: 10.11896/j.issn.1002-137X.2016.04.029
Previous Articles Next Articles
RAN Juan and LI Xiao-yu
[1] China internet network information center.Statistical report on the development of China Internet Network in the thirty-fourth time[R/OL].2014.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201407/P020140721507223212132.pdf(in Chinese) 中国互联网络信息中心.第34次中国互联网络发展状况统计报告[R/OL].2014.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201407/P020140721507223212132.pdf [2] Wu W W,Chen S Y.Research and Development Trend about Eembed Mobile Data Base[J].Computer Science,2005,32(12):88-90(in Chinese) 吴娓娓,陈蜀宇.嵌入式移动数据库现状与发展趋势[J].计算机科学,2005,32(12):88-90 [3] Amja A M,Obaid A,Seguin N.A Distributed Mobile Database Architecture[C]∥ 2011 IEEE Asia-Pacific Conference on Services Computing.2011:62-69 [4] Ying Y,Ren K.Research on mobile database key technologiesand application[J].Microcomputer Information,2010,10(2):89-90(in Chinese) 应毅,任凯.微终端移动数据库关键技术及其应用研究[J].微计算机信息,2010,10(2):89-90 [5] Wang J D.Design and implementment of database encryptionsystem based on advanced data encrytion standard AES[D].Xi’an:Xidian University,2011(in Chinese) 王劲东.基于高级数据库加密标准AES的数据库加密技术研究与实现[D].西安:西安电子科技大学,2011 [6] Shamir A.How to Share a Secret[J].Communication of theACM,1979,2(11):612-613 [7] Hu Z H,Tan Z P,Zhang Q.Novel Method for Impossible Differential Cryptanalysis of 9-Round AES_256 [J].Computer Science,2014,41(8):196-198(in Chinese) 胡志华,覃中平,张青.一种新的9轮AES_256不可能差分分析[J].计算机科学,2014,41(8):196-198 [8] Zhang J H,Guo X B,Fu X.AES encryption algorithm and the application in information security[J].The Security of Information Network,2011(5):32-33(in Chinese) 张金辉,郭晓彪,符鑫.AES加密算法分析及其在信息安全中的应用[J].信息网络安全,2011(5):32-33 [9] Jiang L L.Research of Rational Secret Sharing Technology[D].Harbin:Harbin Normal University,2011(in Chinese) 江林临.理性秘密共享技术研究[D].哈尔滨:哈尔滨师范大学,2011 [10] Li S Y,Shi R H.A Dynamic Secret Key Sharing Scheme[J].Journal of Anhui University (Natural Science Edition),2010,4(3):38-42(in Chinese) 李素云,石润华.一种动态的密钥分存方案[J].安徽大学学报(自然科学版),2010,4(3):38-42 [11] Zhou Z Y,Liu S J,Wang Z Y,et al.Implementation of a Thre-shold Encryption Scheme[J].Modern Computer,2009(11):41-44(in Chinese) 周振宇,刘少军,王子燕,等.一种门限加密方案的实现[J].现代计算机(专业版),2009(11):41-44 [12] Xu M,Cao J N,Peng W.Mobile computing technology[M].Beijing:Tsinghua University Press,2008:12-13(in Chinese) 徐明,曹建农,彭伟.移动计算技术[M].北京:清华大学出版社,2008:12-13 [13] Pu Y Y,Pei Q J,Li H Y.Exploiting the Performance-EnergyTradeoffs for Mobile Databa[J].Journal of Universal Computer Science,2014,0(20):1488-1498 [14] Lan Li-na,Mao Jing-li,Gou Xue-rong.A Novel LightweightMain Memory Database for Telecom Network Performance Management System[J].Journal of Networks,2012,7(4):667-674 [15] Quan Y,He M.Application and implementation of servers loadbalance[J].Microcomputer Applications,2006,27(4):433-435(in Chinese) 全宇,何苗.服务器负载均衡的应用与实现[J].微计算机应用,2006,27(4):433-435 [16] Cheng B.Design and Implementation of Load Balancing Scheduling System[D].Wuhan:Huazhong University of Science and Technology,2011(in Chinese) 程斌.负载均衡调度系统的设计与实现[D].武汉:华中科技大学,2011 |
No related articles found! |
|