相似文献/References:
[1]檀迎军 侯秀萍 赵云峰.工作流迁移问题的研究[J].计算机技术与发展,2009,(01):139.
TAN Ying-jun,HOU Xiu-ping,ZHAO Yun-feng.Study of Workflow Transfer Problem[J].,2009,(05):139.
[2]綦宝声.基于SQL Server2008的DML触发器设计实例分析[J].计算机技术与发展,2012,(06):229.
QI Bao-sheng.Analysis of DML Triggers Design Example Based on SOL Server 2008[J].,2012,(05):229.
[3]宋辉,王明威.基于双远心镜头的虹膜图像采集方法[J].计算机技术与发展,2016,26(08):65.
SONG Hui,WANG Ming-wei. Iris Image Acquisition Method Based on Bilateral Telecentric Lens[J].,2016,26(05):65.
[4]吴明礼,陈斌. 移动互联环境下数据通信安全技术的应用研究[J].计算机技术与发展,2016,26(11):106.
WU Ming-li,CHEN Bin. Research on Application of Data Communication Security Technology in Mobile Internet Environment[J].,2016,26(05):106.
[5]黄娟,王军号,杜朋.数据融合中隐私保护完整性验证算法研究[J].计算机技术与发展,2018,28(08):109.[doi:10.3969/ j. issn.1673-629X.2018.08.023]
HUANG Juan,WANG Jun-hao,DU Peng.Research on Privacy Preserving Integrity Verification Algorithm in Data Fusion[J].,2018,28(05):109.[doi:10.3969/ j. issn.1673-629X.2018.08.023]