相似文献/References:
[1]吴婷婷,李玲娟.面向 RFID 的位置隐私保护算法研究[J].计算机技术与发展,2013,(01):157.
WU Ting-ting,LI Ling-juan.Study on RFID-oriented Location Privacy Protection Algorithm[J].,2013,(09):157.
[2]施佳琪,吴蒙.一种改进的源节点位置隐私保护方法[J].计算机技术与发展,2013,(11):141.
SHI Jia-qi[],WU Meng[].An Improved Method of Source Node Location Privacy Protection[J].,2013,(09):141.
[3]汪玉美,崔逊学,吴海兵,等. 基于多跳LEACH防御流量分析攻击算法研究[J].计算机技术与发展,2014,24(09):154.
WANG Yu-mei,CUI Xun-xue,WU Hai-bing,et al. Research on Defense Traffic Analysis Attacks Algorithm Based on Multi-hop LEACH[J].,2014,24(09):154.
[4]史敏仪,李玲娟. 移动用户位置隐私保护方案研究[J].计算机技术与发展,2014,24(10):151.
SHI Min-yi,LI Ling-juan. Study on Location Privacy Protection Scheme for Moving Objects[J].,2014,24(09):151.
[5]肖红玉,贺 辉,陈红顺.AED 急救地图设计研究[J].计算机技术与发展,2021,31(07):198.[doi:10. 3969 / j. issn. 1673-629X. 2021. 07. 033]
XIAO Hong-yu,HE Hui,CHEN Hong-shun.Research on Design of AED Emergency Map[J].,2021,31(09):198.[doi:10. 3969 / j. issn. 1673-629X. 2021. 07. 033]