Zobrazeno 1 - 10
of 1 065
pro vyhledávání: '"Cryptographic Algorithm"'
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 4, Pp 137-149 (2023)
The purpose of this article is to describe the use of digital noise generators based on semiconductor noise diodes as part of systems for generating key numerical sequences used in cryptographic security methods. The classification of modern methods
Externí odkaz:
https://doaj.org/article/97bf899564964dc5b65ba4f678c06754
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 1, Pp 1131-1147 (2023)
Abstract Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic algorithm identification is the p
Externí odkaz:
https://doaj.org/article/420fb0393276474eb0e7ed3798598181
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
To promote the development and application of “blockchain+supply chain finance” in the agricultural logistics industry, this paper uses the ECC algorithm in the blockchain model as the basis and implements an asymmetric encryption algorithm based
Externí odkaz:
https://doaj.org/article/53f8652b376a4354b234b9ae7f12d7c1
Publikováno v:
Dianzi Jishu Yingyong, Vol 49, Iss 4, Pp 78-82 (2023)
Aiming at the security of some key data storage in network security system, this paper designs a data security storage and processing system based on blockchain technology. Firstly, taking the thermal power plant as an example, the architecture of it
Externí odkaz:
https://doaj.org/article/2f4edcd12322479e8d27f41336e6f43d
Publikováno v:
Zhejiang dianli, Vol 41, Iss 12, Pp 79-87 (2022)
The security requirements of a terminal communication system for distribution automation are studied. Moreover, a communication security architecture for distribution automation terminal conforming to the actual situations of China is designed to s
Externí odkaz:
https://doaj.org/article/77d32d2a84f9471da4069af223d8b9a6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Jisuanji kexue, Vol 49, Iss 9, Pp 288-296 (2022)
The rapid development of artificial intelligence and 5G network technology has opened a new era of interconnection of all things.The great improvement of computing power has threatened the traditional cryptographic algorithm based on the theory of co
Externí odkaz:
https://doaj.org/article/4735c570b57c43e2974ae45689c19438
Publikováno v:
E3S Web of Conferences, Vol 556, p 01048 (2024)
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals alike, safeguarding sensitive information and ensuring secure communication channels has become paramount. This research paper introduces a novel hybrid cr
Externí odkaz:
https://doaj.org/article/fa9307d30a944a71af26351527da249c
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12163 (2023)
The integration of cryptographic algorithms like Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) is pivotal in bolstering the core attributes of blockchain technology, especially in achieving decentralization, tamper resistan
Externí odkaz:
https://doaj.org/article/a0e742fefb954524be4f50a583ce42bf
Publikováno v:
International Journal of Pervasive Computing and Communications, 2021, Vol. 17, Issue 5, pp. 596-610.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-07-2021-0172