RETRACTED ARTICLE: Innovation performance of listed companies based on machine computing and data envelopment analysis

The introduction and creation of new technological means can change and promote the process and results of economic development, thus promoting the steady progress of economic development. In these areas of economic development, some small-scale scientific and technological innovation enterprises occupy a large proportion, and the economic development in other areas cannot do without the promotion of these enterprises, which is a typical model in China Is the gem listing. The listing of gem not only symbolizes that China has made great progress in the field of scientific and technological innovation, but also directly confirms that innovation is the source of economic development. Innovation can not only promote the growth of economic development, but also promote the reform and optimization of economic development system. This paper takes the gem as an example, based on the computer calculation and data envelopment analysis, from the data analysis of the project, summarizes the key factors affecting the innovation and development of an enterprise, and studies the specific path to effectively promote innovation.

[1]  Samiran Chattopadhyay,et al.  A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment , 2019, IEEE Internet of Things Journal.

[2]  S. Ghose,et al.  Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks , 2020, ArXiv.

[3]  Hisham Dahshan,et al.  Key Management in Web of Trust for Mobile Ad Hoc Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[4]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[5]  Mimoza Durresi,et al.  Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring , 2019, J. Ambient Intell. Humaniz. Comput..

[6]  Ahmed Farouk,et al.  Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom , 2018, Quantum Inf. Process..

[7]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[8]  Fenghua Li,et al.  Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario , 2019, IEEE Access.

[9]  B. Anand,et al.  A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network , 2019 .

[10]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[11]  Paul Thomas,et al.  Efficient DCT-based secret key generation for the Internet of Things , 2019, Ad Hoc Networks.

[12]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[13]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[14]  Ahmed Farouk,et al.  Secure dynamic multiparty quantum private comparison , 2019, Scientific Reports.

[15]  Enrico Del Re,et al.  Energy Efficiency Perspectives of PMR Networks , 2017, Inf..

[16]  Chih-Cheng Chen,et al.  Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks , 2015, J. Sensors.

[17]  Yehuda Lindell,et al.  Introduction to Modern Cryptography, Second Edition , 2014 .

[18]  Jingjing Huang,et al.  Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[19]  Vijay Kumar Jha,et al.  Secure key-distribution in IoT cloud networks , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).

[20]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[21]  Hassan N. Noura,et al.  Lightweight and Secure D2D Authentication & Key Management Based on PLS , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).

[22]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[23]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[24]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[25]  Subhasish Banerjee,et al.  An efficient mechanism to generate dynamic keys based on genetic algorithm , 2018 .

[26]  Hayder A. Abdulbari,et al.  Microfluidics Chip for Directional Solvent Extraction Desalination of Seawater , 2019, Scientific Reports.

[27]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[28]  V. N. Sastry,et al.  Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..