[1]贺延平.物联网及其关键技术[J].电子科技,2011,14(8):131-134.
[2]黄孝彬,毛培霖,唐浩源,等.物联网关键技术及其发展[J].电子科技,2011,37(12):129-132.
[3]暴磊,张代远,吴家宝.物联网与隐私保护技术[J].电子科技,2010,16(7):110-112.
[4]向宏,傅鹂,詹榜华.信息安全测评与风险评估[M].北京:电子工业出版社,2009.
[5]曾庆凯,许峰,张有东.信息安全体系结构[M].北京:电子工业出版社,2010.
[6]张守奇,仲红.隐私保护的四方判定线段是否相交协议[J].计算机工程与设计,2009(24):5577-5579.
[7]符祖峰,罗文俊,童玲.一个保护私有信息的线段与椭圆相交判定协议[J].计算机工程与应用,2010,15(17):137-139.
[8]SANCHEZ L,UNIV D C S,GALACHE J A,et al.Smart santander:the meeting point between future internet research and experimentation and the smart cities[C].In Future Network & Mobile Summit (FutureNetw),2011:15-17.
[9]SHARMA P P,THAKSEN J.Network log clustering using k means algorithm[C].Proceedings of the Third International Conference on Trends in Information,Telecommunication and Computing,2013:115-124.
[10]WANG Chengqun,CHEN Jiming,HU Chonghai,et al.Kernel matrix learning with a general regularized risk functional criterion[J].Journal of Systems Engineering and Electronics,2010,21(1):72-80.
|