共 50 条
- [11] A FPGA-Based Scheme for Protecting Weapon System Software Technology COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT V, 2018, 10964 : 148 - 157
- [12] OPTIMIZING TURNAROUND TIME FOR MOBILE AGENTS IN CENTRALIZED KEY SERVER SCHEME PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (ICFCC 2011), 2011, : 225 - 230
- [13] Multiple Replica based Remote Data Possession Checking Scheme based on Matrix Representation of Data INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
- [14] A fault-tolerant voting scheme based on mobile agents 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 126 - 131
- [15] An enhanced Data Possession Checking scheme using Identity Based Signature PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 941 - 944
- [16] Intelligent Data Acquisition Technology Based on Agents The International Journal of Advanced Manufacturing Technology, 2003, 21 : 866 - 873
- [17] Intelligent data acquisition technology based on agents INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2003, 21 (10-11): : 866 - 873
- [18] Intelligent Data Acquisition Technology Based on Agents Hu, Y.M. (youmh@netease.com), 1600, Springer-Verlag London Ltd (21): : 10 - 11
- [20] Hierarchical key management scheme for securing mobile agents with optimal computation time INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 1432 - 1443