相似文献/References:
[1]袁志坚,王春平陈融,陈萍.Android平台安全威胁及其应对策略[J].计算机技术与发展,2013,(09):110.
YUAN Zhi-jian[],WANG Chun-ping[],CHEN Rong[],et al.Security Threats on Android Platform and Their Coping Strategies[J].Computer Technology and Development,2013,(12):110.
[2]高海韬,李丹宁.一种适用于食品供应链的 UHF RFID 读写器设计[J].计算机技术与发展,2021,31(12):155.[doi:10. 3969 / j. issn. 1673-629X. 2021. 12. 026]
GAO Hai-tao,LI Dan-ning.Design of a UHF RFID Reader for Food Supply Chain[J].Computer Technology and Development,2021,31(12):155.[doi:10. 3969 / j. issn. 1673-629X. 2021. 12. 026]