1. Simulation of secure storage of high density information for network data transmission;Cao;Computer Simulation,2017
2. Research on classified protection evaluation based on mobile internet information system;Hu;Information Sec Tech,2017
3. Network security access model based on TCM;Sun;Comm Tech,2019
4. Security protection techniques for network security analysis and monitoring platform;Yan;Software Guide,2019
5. Z.H. Zheng, M.Q. Zhang, X.M. Dai, X.A. Wang, Access control with high efficiency scheme for cloud storage based on proxy re-encryption. Application of Electronic Technique, 42(11) (2016), 99-101, 105.