相似文献/References:
[1]王燕飞 金瓯 贺建飚.嵌入式系统的安全技术研究[J].计算机技术与发展,2008,(08):152.
WANG Yan-fei,JIN Ou,HE Jian-biao.Study of Technology of Security in Embedded System[J].,2008,(04):152.
[2]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148.
ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(04):148.
[3]魏浩,解争龙,弋改珍.基于串空间理论的Kerberos协议分析[J].计算机技术与发展,2013,(12):109.
WEI Hao,XIE Zheng-long,YI Gai-zhen.Analysis of Kerberos Protocol Based on Strand Space Theory[J].,2013,(04):109.
[4]陈艺琳,罗娇燕,胡逸芳,等.一种适用于园区微电网的安全控制协议[J].计算机技术与发展,2022,32(03):120.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 020]
CHEN Yi-lin,LUO Jiao-yan,HU Yi-fang,et al.A Security Control Protocol for Microgrid in Park[J].,2022,32(04):120.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 020]