[PDF][PDF] 醫Future Generation Computer Systems

S Senganº, V Subramaniyaswamy… - Future Generation …, 2020 - researchgate.net
E-governance layer enables planned associations' … Appropriate infrastructural policies are
made at the egovernance unit… Data privacy in security Cryptography methods were utilized for …

基于SIMD 指令集的SM2 数字签名算法快速实现

韦薇, 罗敏, 白野, 彭聪, 何德彪 - Journal of Cryptologic …, 2023 - search.proquest.com
… by the State Cryptography Administration of China. It has been widely used in online
banking, e-governance, and other fields. This paper proposes an implementation of SM2 digital …

[PDF][PDF] 地方政府電子治理成效認知評估研究

潘競恒, 蔣麗君 - 行政暨政策學報, 2013 - pa.ntpu.edu.tw
… Evaluating e-governance is an underdeveloped area whether in academia or governmental
practice. Taiwan’s e-governance performance at the national level has been recognized by …

蒙古組織資訊安全評估個案探討

E Monkhor - 2014 - ir.lib.pccu.edu.tw
… work of the organization’s information security, including network security is dependent on
the organization’s information security risk assessment and management to ensure business …

[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路

RA Memon - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
cryptography-based infrastructure called blockchain emerged with the potential to replace
the existing cloud-based infrastructure of IoT through … hybrid IoT approach that uses the cloud,…

[PDF][PDF] 基于改进期望值决策法的虚拟机可信审计方法

田俊峰, 张永超 - 通信学报, 2018 - infocomm-journal.com
… The designed encryption mechanism was used to protect the security of users selected
security protection level, so as to ensure the security of user virtual machine selection audit …