CN104935785A
|
|
Hadoop based distributed video big data prospect detection and motion tracking method
|
CN104980496A
|
|
Virtual energy-saving dispatching method based on cloud computing load balance
|
CN104933330A
|
|
Linear mixed model based statistical analysis method for large data
|
CN104933089A
|
|
Big data set spectrum clustering method based on accelerating iteration
|
CN104378353A
|
|
Internet of things information security method based on Bayesian clustering
|
CN104378352A
|
|
Method of distributed firewall secure communication mechanism
|
CN104378351A
|
|
Internal network security protection method based on dynamic encryption host identity authentication
|
CN104378195A
|
|
Method for encrypting WSN chaotic block ciphers
|
CN104376246A
|
|
Credible obtaining method of electronic evidence of mobile intelligent terminal
|
CN104378355A
|
|
NAT bidirectional penetrating method for safe virtual network
|
CN104378798A
|
|
Optimized distributed collaborative routing method based on Internet of Things
|
CN104378354A
|
|
Internet of things security model method based on classification
|
CN104376044A
|
|
Information retrieval optimization method based on information granularity
|
CN104408380A
|
|
A method for a mass data secure storage technology
|
CN104391856A
|
|
Covert channel searching method based on information flow context network
|
CN104378350A
|
|
Network security situation awareness method based on hidden Markow model
|
CN105227297A
|
|
A kind of intelligent cipher protection generation method
|
CN105279075A
|
|
Detection method based on sequence mode software safety hole
|
CN105323209A
|
|
Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology
|
CN105099690A
|
|
OTP and user behavior-based certification and authorization method in mobile cloud computing environment
|