[1] Weis SA,Sarma S,Rivest R,et al. Security and privacy aspects of low-cost radio frequency identification systems[C]//Proc of the 1st Int Conf on Security in Pervasive Computing. Heidelberg:Springer, 2004:201-212
[2] 邱 恬.智能家居网络控制系统的主要方案分析[J].科技创新与应用, 2016, (20) : 80-80
[3] 刘熙胖, 廖正赟, 卫志刚. 面向物联网信息安全保护的轻量化密钥体系设计[J] 信息安全研究,2018, 4(9) : 819-824
[4] Niño-Mora J. Resource allocation and routing in parallel multi-server queues with abandonments for cloud profit maximization[J]. Computers and Operations Research. 2018, 11(12) : 221-236
[5] 黄岚,王岩,王康平.Java程序设计[M].北京:机械工业出版社,2016:229-230[2018-11-19].http://www.hzmedia.com.cn
[6] Gusarovs K. An analysis on Java programming language decompiler capabilities[J]. Applied Computer Systems, 2018, 23(2) : 109-117
[7] 顾欣, 徐淑珍 .区块链技术的安全问题研究综述[J].信息安全研究. 2018, 4(11) : 997-1001
[8] Zhang LY, Li CQ.Wong K,et al. Cryptanalyzing a chaos-based image encryption algorithm using alternate structure[J] . The Journal of Systems & Software . 2012,3(9) : 334-341
[9] Maniccam SS , Bourbakis NG. Lossless image compression and encryption using SCAN[J]. Pattern Recognition,2001,6(34) : 1229-1245
[10] Tuulaikhuu BA, Guasch H. García-Berthou E. Examining predictors of chemical toxicity in freshwater fish using the random forest technique[J]. Environmental Science and Pollution Research, 2017, 24(11) : 10172-10181
[11] 丁 函,罗 军,陆文骏,等.智能家居控制 APP 系统的设计与实现[J].计算机技术与发展,2017, 27(1) : 121-125
[12] García-Magariño I, Cerezo E, Plaza I, et al. A mobile application to report and detect 3D body emotionalposes[J]. arXiv preprint, arXiv: 0957.4174, 2019