Open Access

Research On A Cotton Storage Platform And Security Strategy Based On Iot


Cite

1. Yang, Jincui. Research on Key Technologies of Control Security in the Internet of Things. Beijing University of Posts and Telecommunications, 2013.Search in Google Scholar

2. Liu, Jun, Yan Fang, Yang Xi. The Internet of Things Technology. Beijing, Mechanical Industry Press, 2013.Search in Google Scholar

3. Long, Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Modle. - Research and Development of the Computer, Vol. 42, 2005, No 5, 868-876.10.1360/crad20050523Search in Google Scholar

4. Li, Wenjun. Research and Design of High School Educational Administration System Based on C/S and B/S Hybrid Architecture. Nanchang HangKong University, Nanchang, 2012.Search in Google Scholar

5. Su, Kaiyuan. Research and Implementation of the Encryption Algorithm. Nanjing University of Posts and Telecommunications, 2012.Search in Google Scholar

6. Li, Anzhi, Cui Wei, Xu Yonghong. A Authority Controlling Scheme in Web Accessing Based on Role. - Computer and Information Technology, Vol. 6, 4-6, 46.Search in Google Scholar

7. Xia Shuhua. Research on Data Security Transmission Technology Based on DES and RSA Encryption Algorithm. - Manufacturing Automation, Vol. 02, 2011, 180-182.Search in Google Scholar

8. Wang, Yan. Research on Key Technologies of Information Transmission for IoT Control System. Northeast Forestry University, 2012.Search in Google Scholar

9. Zhang, Zejian. Internet Information Security Research. - Logistics Technology, Vol. 20, 2011, 29-31.Search in Google Scholar

10. Hong, Ren. Introduction to the Internet of Things Security Issues and Measures. - Computer CD Software and Application, Vol. 13, 2012, 54-55.Search in Google Scholar

11. Liu, Junbin, Wang Yong. Application of Multi-Campus Network Based on MPLS VPN. - Value Engineering, Vol. 3, 2014, 188-190.Search in Google Scholar

12. Sun, Lifei. Research on the Campus Network Based on VPN Technology. - Information and Communication, Vol. 1, 2014, 103-104.Search in Google Scholar

13. Hellman, M. E. DES Will Be Totally Insecure Within Ten Years. - IEEE Spectrum, Vol. 16, July 1979, No 7, 32-39.10.1109/MSPEC.1979.6368157Search in Google Scholar

14. Rives t, R. L., A. Shami r, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. - Communications of the ACM, Vol. 21, 1978, No 2, 120-126.10.1145/359340.359342Search in Google Scholar

15. Atzori, L., A. Iera, G. Morabito. The Internet of Things: A Survey. - Computer Networks, Vol. 54, 28 October 2010, Issue 15, 2787-2805.10.1016/j.comnet.2010.05.010Search in Google Scholar

16. Zhiyong, Luo, Bo You. Research on University Digital Library Formation Model Based on VPN Network. - Library Studies, Vol. 1, 2013, 35, 52-59. Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology