您当前的位置:
首页 >
文章列表页 >
Privacy Protection Scheme of Internet of Things Based on Trusted Identity Retrieval
更新时间:2023-05-29
    • Privacy Protection Scheme of Internet of Things Based on Trusted Identity Retrieval

    • Software Guide   Vol. 22, Issue 5, Pages: 144-149(2023)
    • DOI:10.11907/rjdk.231035    

      CLC:

    扫 描 看 全 文

  • ZHAO Liang,WANG Xue-liang,CHEN Sheng-tao.Privacy Protection Scheme of Internet of Things Based on Trusted Identity Retrieval[J].Software Guide,2023,22(05):144-149. DOI: 10.11907/rjdk.231035.

  •  
  •  

0

Views

6

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Design and Implementation of Precision Control Platform for Installment Agriculture Based on the IoT
Review of Vulnerability Detection Methods Based on Internet of Things Firmware
Construction of Internet of Things Control System Lab Platform for New Engineering Talent Training
Micro Plant Growth System Based on Fuzzy Control Algorithm
Research and Design of Environmental Suitability Evaluation System for Fattening Piggery Based on Internet of Things

Related Author

No data

Related Institution

Hubei Provincial Engineering Research Center of Agricultural Blockchain and Intelligent Management
School of Computer Science, South-Central Minzu University
School of Software Engineering,East China Normal University
School of Computer Science and Technology,Harbin Institute of Technology
School of Information Engineering, Jiangxi University of Technology
0