1. Evaluation of Reliable Data Transmission Protocol in Wireless Sensor-Actuator Network[J].;Morita;Journal of Trust Management,2016
2. Analyze the security threats and countermeasures of computer network database [J].;Shao-wu;Communication world,,2014
3. High Secured Low Power Multiplexer-LUT Based AES S-Box Implementation[C];Pammu;International Conference on Information Systems Engineering.,2016
4. Application and research of compound encryption technology in management information system [J].;Kong;Old building,,2010
5. The implementation of a fast and decrypted AES algorithm for resource sharing [J].;Jun;microprocessor,2011