相似文献/References:
[1]甘金明.高校短信息平台安全性研究[J].计算机技术与发展,2008,(09):138.
GAiN Jin-ming.Study of Security for College Short Message Platform[J].,2008,(03):138.
[2]林雅榕 侯整风.对哈希算法SHA-1的分析和改进[J].计算机技术与发展,2006,(03):124.
LIN Ya-rong,HOU Zheng-feng.Analysis and Improvement to Algorithm of SHA- 1[J].,2006,(03):124.
[3]赵涛[],张太红[][],陈燕红[]. 中文农业网页去重及相似度判断研究[J].计算机技术与发展,2015,25(01):191.
ZHAO Tao[],ZHANG Tai-hong[][],CHEN Yan-hong[]. Research on Duplicate Removal and Similarity Evaluation of Chinese Agricultural Web Pages[J].,2015,25(03):191.
[4]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(03):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]