Have a personal or library account? Click to login
Research On A Cotton Storage Platform And Security Strategy Based On Iot Cover

Research On A Cotton Storage Platform And Security Strategy Based On Iot

By: Zhao Xiaodong and  Li Yajing  
Open Access
|Dec 2014

References

  1. 1. Yang, Jincui. Research on Key Technologies of Control Security in the Internet of Things. Beijing University of Posts and Telecommunications, 2013.
  2. 2. Liu, Jun, Yan Fang, Yang Xi. The Internet of Things Technology. Beijing, Mechanical Industry Press, 2013.
  3. 3. Long, Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Modle. - Research and Development of the Computer, Vol. 42, 2005, No 5, 868-876.10.1360/crad20050523
  4. 4. Li, Wenjun. Research and Design of High School Educational Administration System Based on C/S and B/S Hybrid Architecture. Nanchang HangKong University, Nanchang, 2012.
  5. 5. Su, Kaiyuan. Research and Implementation of the Encryption Algorithm. Nanjing University of Posts and Telecommunications, 2012.
  6. 6. Li, Anzhi, Cui Wei, Xu Yonghong. A Authority Controlling Scheme in Web Accessing Based on Role. - Computer and Information Technology, Vol. 6, 4-6, 46.
  7. 7. Xia Shuhua. Research on Data Security Transmission Technology Based on DES and RSA Encryption Algorithm. - Manufacturing Automation, Vol. 02, 2011, 180-182.
  8. 8. Wang, Yan. Research on Key Technologies of Information Transmission for IoT Control System. Northeast Forestry University, 2012.
  9. 9. Zhang, Zejian. Internet Information Security Research. - Logistics Technology, Vol. 20, 2011, 29-31.
  10. 10. Hong, Ren. Introduction to the Internet of Things Security Issues and Measures. - Computer CD Software and Application, Vol. 13, 2012, 54-55.
  11. 11. Liu, Junbin, Wang Yong. Application of Multi-Campus Network Based on MPLS VPN. - Value Engineering, Vol. 3, 2014, 188-190.
  12. 12. Sun, Lifei. Research on the Campus Network Based on VPN Technology. - Information and Communication, Vol. 1, 2014, 103-104.
  13. 13. Hellman, M. E. DES Will Be Totally Insecure Within Ten Years. - IEEE Spectrum, Vol. 16, July 1979, No 7, 32-39.10.1109/MSPEC.1979.6368157
  14. 14. Rives t, R. L., A. Shami r, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. - Communications of the ACM, Vol. 21, 1978, No 2, 120-126.10.1145/359340.359342
  15. 15. Atzori, L., A. Iera, G. Morabito. The Internet of Things: A Survey. - Computer Networks, Vol. 54, 28 October 2010, Issue 15, 2787-2805.10.1016/j.comnet.2010.05.010
  16. 16. Zhiyong, Luo, Bo You. Research on University Digital Library Formation Model Based on VPN Network. - Library Studies, Vol. 1, 2013, 35, 52-59.
DOI: https://doi.org/10.2478/cait-2014-0052 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 159 - 171
Published on: Dec 30, 2014
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2014 Zhao Xiaodong, Li Yajing, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.