Supply chain financing scheme based on blockchain technology from a business application perspective

CH Tsai - Annals of Operations Research, 2023 - Springer
Supply chain finance (SCF) essentially provides a flexible cash flow solution that maximizes
the working capital situation for the main stakeholders in the supply chain. Buyers benefit …

RSA and Elliptic Curve Encryption System: A Systematic Literature Review

M Ugbedeojo, MO Adebiyi, OJ Aroba… - International Journal of …, 2024 - igi-global.com
Almost every living species has a motive to communicate electronically with one another
and preserve data for immediate or future use. These data are becoming too large to be …

An identity-based elliptic curve cryptography for mobile payment security

OR Vincent, TM Okediran, AA Abayomi-Alli… - SN Computer …, 2020 - Springer
Security breaches have been observed in different dimensions in mobile payment system.
The violation of user's privacy is a common phenomenon in mobile payment transactions …

SLAK: secure lightweight scheme for authentication and key-agreement in internet of things

O Nahnah, S Cherbal - International Journal of Information …, 2024 - inderscienceonline.com
Internet of things connect unlimited number of heterogeneous devices in order to facilitate
services and hence touching most of daily life fields. However, security concerns are a major …

Statistical Analysis of Pollard's Rho Attack on Elliptic Curve Cryptography

MJ Josodipuro, KVI Saputra… - 2022 1st International …, 2022 - ieeexplore.ieee.org
Elliptic curve cryptography is a relatively new public-key cryptography mechanism which has
been becoming more popular in recent years. Its usage has been increasing in various …

[PDF][PDF] Secure transmission of data in smart grid with the aid of elliptic curve cryptography method

AP Suma, S Shankar, C Puttamadappa - Technology, 2016 - academia.edu
ABSTRACT A smart grid represents a straightforward improvement of a power grid, which
effectively hands over electricity from suppliers to clients. It generally uses a two-way digital …

[PDF][PDF] New proxy blind signcryption scheme for secure multiple digital messages transmission based on elliptic curve cryptography

PC Su, CH Tsai - KSII Transactions on Internet and Information …, 2017 - koreascience.kr
Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures
are widely used for privacy-related applications such as electronic cash, electronic voting …

[PDF][PDF] Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography

R Kaur, T Singh - International Journal of Computer Applications, 2015 - Citeseer
Multimedia data security is becoming important with the continuous increase of digital
communication on the internet. Without having privacy of data there is no meaning of doing …

Encryption scheme based on hyperelliptic curve cryptography

AL John, SM Thampi - Security, Privacy, and Anonymity in Computation …, 2016 - Springer
In modern times, common man uses small computing devices like mobile phones, RFID
systems and embedded systems. Such devices are resource constrained. Hence, algorithms …

Secure authentication scheme for an agricultural supply chain finance environment

CH Tsai, CW Hung, PC Su - 管理評論, 2017 - airitilibrary.com
The rapid development of information technology and popularization of the Internet have
driven many innovative applications in the finance sector. The adoption of supply chain …