區塊鏈如何徹底改變約旦銀行業?

Z Saidat, M Silva, D Al-Daboubi… - … Xuebao/Journal of …, 2022 - researchonline.gcu.ac.uk
… This study explores the technology of blockchain, the emerging technology that powers …
[22], exploiting cryptographic practices to protect transactions and manage the creation of …

[HTML][HTML] SSL & KerberosV 专栏收录该内容

BC Neuman, T Ts'o - blog.csdn.net
… When using authentication based on cryptography, an attacker listening to the network gains
… It does not protect all messages sent between two computers; it only protects the messages …

一种面向云端辅助工业控制系统的安全机制

屠袁飞, 杨庚, 张成真 - 自动化学报, 2021 - aas.net.cn
… His research interest covers network security, parallel & distributed … encryption is used to
construct access control policies, provide authentication and authorization services, protect the …

[图书][B] 电子信息科学专业英语导读教程

郝红尉 - 2005 - books.google.com
… ) Studying of the analogy between the farm and the computer … to handle only one kind of
encryption algorithm, such as DES; … are capable of implementing many encryption algorithms. …

[PDF][PDF] 能源互联网中的区块链技术: 研究框架与典型应用初探

张宁, 王毅, 康重庆, 程将南, 贺大玮 - 中国电机工程学报, 2016 - researchgate.net
… Data integrity protection method for microorganism sampling … research framework of
blockchain technique in the Energy … Blockchain uses an asymmetric encryption algorithm to solve …

[PDF][PDF] 密钥安全及其在虚拟化技术下的新发展

祝凯捷, 蔡权伟, 林璟锵, 荆继武 - 密码学报, 2016 - jcr.cacrnet.org.cn
protection schemes. Secondly, we present the recent progress of attacks and protections on
… virtualization technology. Finally, we summarize the research directions on cryptographic

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… introduce the related research work in the field of blockchain privacy protection. Section 3 …
In addition, key security and encryption algorithms are crucial to protecting the contract state …

[HTML][HTML] 具客戶端認證及數位著作權管理之隨選視訊系統

CG Fan - 2004 - ir.lib.ncu.edu.tw
… When users receive the video, we have to manage and protect the … We encrypt the videos
using symmetric encryption algorithm to manage videos. Then we use the license technique in …

[HTML][HTML] 以代理人為基礎之電子錢幣付款系統

TF Chang - 2005 - ir.lib.ncu.edu.tw
… key generation which facilitates the efficiency of encryption and the hash function to support
encryption technology, and maintains the efficiency of symmetric encryption technology

TuLP: 一类面向医疗传感器网络的轻量级消息认证码

龚征, 唐韶华, 朱博 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
encryption and MAC function are secure, Tag2 protects the authenticity and integrity of the
header and Tag1, whilst Tag1 protects … Before we study the performance of TuLP and TuLP…