共 16 条
- [1] AN Y, ZHAO B, LI Y M., Research on software protection method based on USB Key, 19th IEEE International Symposium on Asynchronous Circuits and Systems, pp. 210-213, (2013)
- [2] LANG Q Y, WU M C, ZHANG N, Et al., Application research of Arduino in the development of pressure monitoring project, Technology Wind, 12, (2019)
- [3] SUN L J, LONG Y, HUANG X, Et al., Discussion on the reform of electronic technology experiment teaching based on Arduino, Electronics World, 3, pp. 34-35, (2019)
- [4] LIU Y H, SHEN C X., An Information security function and application model, Journal of Computer-Aided Design & Computer Graphics, 17, 12, pp. 2734-2738, (2005)
- [5] YANG J, ZHOU J., Analysis on the security threats of ID authentication and threat defense measure, Netinfo Security, 11, pp. 83-84, (2010)
- [6] ZHAO D D, LUO W J., One-time password password authentication scheme based on the negative database, Engineering Applications of Artificial Intelligence: The International Journal of Intelligent Real-Time Automation, 62, pp. 396-404, (2017)
- [7] GAO M., Talking about the application of symmetric encryption algorithm and asymmetric encryption algorithm, Electronics World, 15, pp. 59-60, (2015)
- [8] CAI M., Analysis on the application of data encryption technology in computer network communication security, Telecom World, 26, 5, pp. 92-93, (2019)
- [9] WU Z H, ZHAO J N, ZHU Y, Et al., Comparative study on application of Chinese cryptographic algorithms and international cryptographic algorithms in vehicle microcotrollers, Netinfo Security, 8, pp. 68-75, (2019)
- [10] LIU J D, TIAN Y, WANG S H, Et al., A fast new one-way cryptographic hash function, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 302-306, (2010)