共 50 条
- [21] Rule Based Authorization Management Using User Context and ROLE CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2012, 310 : 172 - 179
- [22] User-Friendly Authentication and Authorization Using a Smartphone Proxy COMPUTER AIDED SYSTEMS THEORY, PT II, 2013, 8112 : 390 - 399
- [24] Utilizing the Virtualization Technology in Computer Operating System Teaching PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 885 - 888
- [26] Software performance testing scheme using Virtualization technology PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 439 - 443
- [28] A study on attack information collection using virtualization technology Multimedia Tools and Applications, 2015, 74 : 8791 - 8799
- [29] IP traffic generator using container virtualization technology 2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
- [30] Correspondent authorization in the GSM telephony using watermarking technology 2006 EUROPEAN CONFERENCE ON WIRELESS TECHNOLOGIES, 2006, : 150 - +