[1. Yang, Jincui. Research on Key Technologies of Control Security in the Internet of Things. Beijing University of Posts and Telecommunications, 2013.]Search in Google Scholar
[2. Liu, Jun, Yan Fang, Yang Xi. The Internet of Things Technology. Beijing, Mechanical Industry Press, 2013.]Search in Google Scholar
[3. Long, Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Modle. - Research and Development of the Computer, Vol. 42, 2005, No 5, 868-876.10.1360/crad20050523]Search in Google Scholar
[4. Li, Wenjun. Research and Design of High School Educational Administration System Based on C/S and B/S Hybrid Architecture. Nanchang HangKong University, Nanchang, 2012.]Search in Google Scholar
[5. Su, Kaiyuan. Research and Implementation of the Encryption Algorithm. Nanjing University of Posts and Telecommunications, 2012.]Search in Google Scholar
[6. Li, Anzhi, Cui Wei, Xu Yonghong. A Authority Controlling Scheme in Web Accessing Based on Role. - Computer and Information Technology, Vol. 6, 4-6, 46.]Search in Google Scholar
[7. Xia Shuhua. Research on Data Security Transmission Technology Based on DES and RSA Encryption Algorithm. - Manufacturing Automation, Vol. 02, 2011, 180-182.]Search in Google Scholar
[8. Wang, Yan. Research on Key Technologies of Information Transmission for IoT Control System. Northeast Forestry University, 2012.]Search in Google Scholar
[9. Zhang, Zejian. Internet Information Security Research. - Logistics Technology, Vol. 20, 2011, 29-31.]Search in Google Scholar
[10. Hong, Ren. Introduction to the Internet of Things Security Issues and Measures. - Computer CD Software and Application, Vol. 13, 2012, 54-55.]Search in Google Scholar
[11. Liu, Junbin, Wang Yong. Application of Multi-Campus Network Based on MPLS VPN. - Value Engineering, Vol. 3, 2014, 188-190.]Search in Google Scholar
[12. Sun, Lifei. Research on the Campus Network Based on VPN Technology. - Information and Communication, Vol. 1, 2014, 103-104.]Search in Google Scholar
[13. Hellman, M. E. DES Will Be Totally Insecure Within Ten Years. - IEEE Spectrum, Vol. 16, July 1979, No 7, 32-39.10.1109/MSPEC.1979.6368157]Search in Google Scholar
[14. Rives t, R. L., A. Shami r, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. - Communications of the ACM, Vol. 21, 1978, No 2, 120-126.10.1145/359340.359342]Search in Google Scholar
[15. Atzori, L., A. Iera, G. Morabito. The Internet of Things: A Survey. - Computer Networks, Vol. 54, 28 October 2010, Issue 15, 2787-2805.10.1016/j.comnet.2010.05.010]Search in Google Scholar
[16. Zhiyong, Luo, Bo You. Research on University Digital Library Formation Model Based on VPN Network. - Library Studies, Vol. 1, 2013, 35, 52-59. ]Search in Google Scholar