A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
Summarizes the requirements and limitations of secure communication, introduces a light-weight SM9 encryption algorithm with low implementation cost and low resource consumption. ... And compared with other encryption algorithms. 3. Provide algorithmic foundation for establish a framework for secure transmission of light-weight data and achieve data confidentiality protection. ... Acknowledgments The authors would like to thank anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China under Grant No. ...doi:10.53106/199115992022023301017 fatcat:gx4hmkhx6jhi5mihuzuggejxdi
In the device authentication process, we used identity-based encryption algorithms, and we solved the trust problem between different regions by introducing a private blockchain. ... We deployed distributed identity authentication and data proxy services in various regions. ... Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls  . ...doi:10.3390/s21186084 pmid:34577289 pmcid:PMC8471528 fatcat:jfktltkhobfvdo7xrfzdwnze2i
The approach to the data analysis was systematic, based on the application of GT. ... When using credit cards over open networks, encryption mechanisms, such as widely used Secure Socket Lauer (SSL), in principle can prevent a hacker or eavesdropper from intercepting the customer's credit ... 1 Artikelen 2 Rapporten en verslagen 3 Advies over producten en diensten 4 Kranten en tijdschriften 5 Bieden bij veilingen 6 Muziek, video op internet 7 Anders, namelijk _______________________________ ...doi:10.6100/ir575913 fatcat:kpkzycfgtvaydoldrp52fm3x4i
Electronic Journal of e-Government
The pool of items is generated based on literature review. Q-Methodology has been utilised to validate the generated measurement items. ... Key Generator provides vote encryption key to the voter over Ballot Generator. ... DynaVote does not use complex algorithms such as homomorphic encryption and does not require anonymous communication channels such as mix-nets. ...fatcat:7sudgk3axzb2rowdps7rrb4yyy
and truly over. ... His anonymity meant that he could have come from any rank, race, or religion represented in a nation's armed forces. ... Laidlaw, a prominent Auckland businessman, moved the following resolution before over 3,000 citizens at a meeting of the Business Men's Committee: 'That this meeting of Auckland citizens enters the strongest ...doi:10.32912/bulletin/21/12 fatcat:kkpcrcfbfjaq5mdqyu4llxlmi4