THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM

被引:0
|
作者
MUELLERSCHLOER, C
WAGNER, NR
机构
[1] SIEMENS CORP, CHERRY HILL, NJ 08034 USA
[2] DREXEL UNIV, PHILADELPHIA, PA 19104 USA
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:487 / +
页数:1
相关论文
共 50 条
  • [31] Optical Cryptography-Based Temporal Ghost Imaging With Chaotic Laser
    Pan, Zilan
    Zhang, Leihong
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2017, 29 (16) : 1289 - 1292
  • [32] Modified security and cryptography-based data deduplication in cloud environment
    Kumar, Doddi Suresh
    Srinivasu, Nulaka
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2025,
  • [33] Homomorphic cryptography-based privacy-preserving network communications
    Guellier, Antoine
    Bidan, Christophe
    Prigent, Nicolas
    Communications in Computer and Information Science, 2014, 490 : 159 - 170
  • [34] Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
    Zhang, Liping
    Tang, Shanyu
    Luo, He
    PLOS ONE, 2016, 11 (03):
  • [35] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Chien, Hung-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2925 - 2936
  • [36] SECURE KEY DISTRIBUTION-SYSTEM BASED ON QUANTUM CRYPTOGRAPHY
    TOWNSEND, PD
    ELECTRONICS LETTERS, 1994, 30 (10) : 809 - 811
  • [37] A Secure Face Verification System Based on Robust Hashing and Cryptography
    Abdel-Ghaffar, Eman A.
    Allam, Mahmoud E.
    Mansour, Hala A. K.
    Abo-Alsoud, M. A.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 366 - +
  • [38] Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm
    Kim, Juyoung
    Jeong, Sooyong
    Hong, Dowon
    Jho, Nam-Su
    IEEE ACCESS, 2023, 11 : 45323 - 45333
  • [39] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [40] A Design of Elliptic Curve Cryptography-based Authentication using QR Code
    Thiranant, Non
    Kang, Young-Jin
    Kim, Taeyong
    Jang, WonTae
    Park, Suhyun
    Lee, HoonJae
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619