Filters








5 Hits in 2.3 sec

Based on SM - 9 Cloud Edge System Information Security Transmission

Cai-Sen Chen Cai-Sen Chen, Yang-Xia Xiang Cai-Sen Chen, Jia-Xing Du Yang-Xia Xiang, 陳嵩 Jia-Xing Du, Cong Lin Song Chen
2022 Diànnǎo xuékān  
Summarizes the requirements and limitations of secure communication, introduces a light-weight SM9 encryption algorithm with low implementation cost and low resource consumption.  ...  And compared with other encryption algorithms. 3. Provide algorithmic foundation for establish a framework for secure transmission of light-weight data and achieve data confidentiality protection.  ...  Acknowledgments The authors would like to thank anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China under Grant No.  ... 
doi:10.53106/199115992022023301017 fatcat:gx4hmkhx6jhi5mihuzuggejxdi

Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography

Yifan Meng, Jingzhao Li
2021 Sensors  
In the device authentication process, we used identity-based encryption algorithms, and we solved the trust problem between different regions by introducing a private blockchain.  ...  We deployed distributed identity authentication and data proxy services in various regions.  ...  Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls [18] .  ... 
doi:10.3390/s21186084 pmid:34577289 pmcid:PMC8471528 fatcat:jfktltkhobfvdo7xrfzdwnze2i

Electronic payment systems:a user-centered perspective and interaction design [article]

Abrazhevich, D (Dennis), Rauterberg, GWM (Matthias), PMA Ribbers, Markopoulos, P (Panos)
2004
The approach to the data analysis was systematic, based on the application of GT.  ...  When using credit cards over open networks, encryption mechanisms, such as widely used Secure Socket Lauer (SSL), in principle can prevent a hacker or eavesdropper from intercepting the customer's credit  ...  1 Artikelen 2 Rapporten en verslagen 3 Advies over producten en diensten 4 Kranten en tijdschriften 5 Bieden bij veilingen 6 Muziek, video op internet 7 Anders, namelijk _______________________________  ... 
doi:10.6100/ir575913 fatcat:kpkzycfgtvaydoldrp52fm3x4i

Conceptualising Citizen's Trust in e-Government: Application of Q Methodology

Hisham Alsaghier, Marilyn Ford, Anne Nguyen, Rene Hexel
2009 Electronic Journal of e-Government   unpublished
The pool of items is generated based on literature review. Q-Methodology has been utilised to validate the generated measurement items.  ...  Key Generator provides vote encryption key to the voter over Ballot Generator.  ...  DynaVote does not use complex algorithms such as homomorphic encryption and does not require anonymous communication channels such as mix-nets.  ... 
fatcat:7sudgk3axzb2rowdps7rrb4yyy

The disabled soldiers' embroidery industry casket in the Museum of New Zealand Te Papa Tongarewa

Joseph McBrinn
2020 Bulletin of the Auckland Museum  
and truly over.  ...  His anonymity meant that he could have come from any rank, race, or religion represented in a nation's armed forces.  ...  Laidlaw, a prominent Auckland businessman, moved the following resolution before over 3,000 citizens at a meeting of the Business Men's Committee: 'That this meeting of Auckland citizens enters the strongest  ... 
doi:10.32912/bulletin/21/12 fatcat:kkpcrcfbfjaq5mdqyu4llxlmi4