共 50 条
- [41] Research and implementation of key technologies of digital forensics based on cloud computing [J]. Fang, Wei, 1600, Universidad Central de Venezuela (55):
- [42] The Application and Key Technology of Computer Technology in Graphic Image Processing [J]. 2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 543 - 546
- [43] Key research on computer aided tolerancing [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2015, 16 (05): : 335 - 340
- [44] The application of XML-based Data Exchanging Technology in The Computer Forensics Field [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 395 - 400
- [45] Research on Secure Key Techniques of Trustworthy Distributed System [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 172 - +
- [46] Research on E-Commerce Secure Technology [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [48] Key Establishment for Secure Asymmetric Cross-Technology Communication [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 412 - 422
- [49] Research on Algorithm Based on Secure Computer Network Defense [J]. PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1462 - 1468
- [50] Baccalaureate Programs in Computer Forensics [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2016, : 615 - 620