A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Based on SM - 9 Cloud Edge System Information Security Transmission
2022
Diànnǎo xuékān
Summarizes the requirements and limitations of secure communication, introduces a light-weight SM9 encryption algorithm with low implementation cost and low resource consumption. ...
And compared with other encryption algorithms. 3. Provide algorithmic foundation for establish a framework for secure transmission of light-weight data and achieve data confidentiality protection. ...
Acknowledgments The authors would like to thank anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China under Grant No. ...
doi:10.53106/199115992022023301017
fatcat:gx4hmkhx6jhi5mihuzuggejxdi
Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography
2021
Sensors
In the device authentication process, we used identity-based encryption algorithms, and we solved the trust problem between different regions by introducing a private blockchain. ...
We deployed distributed identity authentication and data proxy services in various regions. ...
Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls [18] . ...
doi:10.3390/s21186084
pmid:34577289
pmcid:PMC8471528
fatcat:jfktltkhobfvdo7xrfzdwnze2i
Electronic payment systems:a user-centered perspective and interaction design
[article]
2004
The approach to the data analysis was systematic, based on the application of GT. ...
When using credit cards over open networks, encryption mechanisms, such as widely used Secure Socket Lauer (SSL), in principle can prevent a hacker or eavesdropper from intercepting the customer's credit ...
1 Artikelen 2 Rapporten en verslagen 3 Advies over producten en diensten 4 Kranten en tijdschriften 5 Bieden bij veilingen 6 Muziek, video op internet 7 Anders, namelijk _______________________________ ...
doi:10.6100/ir575913
fatcat:kpkzycfgtvaydoldrp52fm3x4i
Conceptualising Citizen's Trust in e-Government: Application of Q Methodology
2009
Electronic Journal of e-Government
unpublished
The pool of items is generated based on literature review. Q-Methodology has been utilised to validate the generated measurement items. ...
Key Generator provides vote encryption key to the voter over Ballot Generator. ...
DynaVote does not use complex algorithms such as homomorphic encryption and does not require anonymous communication channels such as mix-nets. ...
fatcat:7sudgk3axzb2rowdps7rrb4yyy
The disabled soldiers' embroidery industry casket in the Museum of New Zealand Te Papa Tongarewa
2020
Bulletin of the Auckland Museum
and truly over. ...
His anonymity meant that he could have come from any rank, race, or religion represented in a nation's armed forces. ...
Laidlaw, a prominent Auckland businessman, moved the following resolution before over 3,000 citizens at a meeting of the Business Men's Committee: 'That this meeting of Auckland citizens enters the strongest ...
doi:10.32912/bulletin/21/12
fatcat:kkpcrcfbfjaq5mdqyu4llxlmi4