THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM

被引:0
|
作者
MUELLERSCHLOER, C
WAGNER, NR
机构
[1] SIEMENS CORP, CHERRY HILL, NJ 08034 USA
[2] DREXEL UNIV, PHILADELPHIA, PA 19104 USA
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:487 / +
页数:1
相关论文
共 50 条
  • [41] Differential privacy: Review of improving utility through cryptography-based technologies
    Huang, Wen
    Zhuo, Ming
    Zhu, Tianqing
    Zhou, Shijie
    Liao, Yongjian
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (05):
  • [42] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Hung-Yu Chien
    Wireless Personal Communications, 2017, 94 : 2925 - 2936
  • [43] Teaching Cryptography-based Software Developing with Open-source Software
    Tang, Yi
    Zhou, Quan
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1604 - 1608
  • [44] Extending the Collaboration Boundary in Localized Threshold Cryptography-Based Schemes for MANETs
    Tarmizi, Seleviawati
    Veeraraghavan, Prakash
    Ghosh, Somnath
    2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 290 - 294
  • [45] Methodology and toolset for ASIP design and development targeting cryptography-based applications
    Montgomery, David
    Akoglu, Ali
    2007 IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, 2007, : 365 - 370
  • [46] A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery
    Salim, Moataz Z.
    Abboud, Ali J.
    Yildirim, Remzi
    ELECTRONICS, 2022, 11 (01)
  • [47] Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (07): : 618 - 624
  • [48] Secure Cryptography Testbed Implementation for SCADA Protocols Security
    Shahzad, AAmir
    Musa, Shahrulniza
    Aborujilah, Abdulaziz
    Irfan, Muhammad
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 315 - 320
  • [49] IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s
    Ben-Othman, Jalel
    Benitez, Yesica I. Saavedra
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (05): : 686 - 700
  • [50] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
    Zhai, Haonan
    Deng, Miaolei
    Wu, Huanmei
    SYMMETRY-BASEL, 2024, 16 (07):