Providing data integrity for container dwelling time in the seaport
暂无分享,去创建一个
Kyung Hyune Rhee | Hilwadi Hindersah | Sandi Rahmadika | Pranoto H. Rusmin | K. Rhee | H. Hindersah | P. Rusmin | S. Rahmadika
[1] Joseph K. Liu,et al. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..
[2] Paulo S. L. M. Barreto,et al. Shorter hash-based signatures , 2016, J. Syst. Softw..
[3] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Chin-Chen Chang,et al. Security enhancement for digital signature schemes with fault tolerance in RSA , 2007, Inf. Sci..
[6] Bayu Adhi Tama,et al. Performance Analysis of Multiple Classifier System in DoS Attack Detection , 2015, WISA.
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] Lucia Moura,et al. Locating modifications in signed data for partial data integrity , 2015, Inf. Process. Lett..
[9] Burton Rosenberg,et al. Handbook of Financial Cryptography and Security , 2010 .
[11] Jinjun Chen,et al. External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..
[12] Filip Merckx,et al. The issue of dwell time charges to optimize container terminal capacity , 2005 .
[13] Paris Kitsos,et al. An efficient implementation of the digital signature algorithm , 2002, 9th International Conference on Electronics, Circuits and Systems.
[14] Alexander A. Hernandez,et al. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-cast Messenger Application , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[15] P. Varalakshmi,et al. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..