:::

詳目顯示

回上一頁
題名:The Enabling Technique for Digital Transformation in Financial Sectors: A Signatory Embedded Blockchain and Digital Identity
書刊名:科技管理學刊
作者:林亭汝 引用關係王仁聖 引用關係
作者(外文):Lin, Grace T. R.Wang, Jen-sheng
出版日期:2021
卷期:26:2
頁次:頁1-24
主題關鍵詞:金融領域數位轉型賦能技術區塊鏈數位身份數位簽章Digital transformationFinancial sectorsEnabling techniqueBlockchainDigital identity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.Diffie, W.、Hellman, M. E.(1976)。New Directions in Cryptography。IEEE Transactions on Information Theory,22(6),644-654。  new window
2.Shannon, C. E.(2001)。A mathematical theory of communication。ACM SIGMOBILE Mobile Computing and Communications Review,5(1),3-55。  new window
3.Zhou, Y.、Guo, G.、Li, F.(2020)。Certificateless public key encryption with cryptographic reverse firewalls。Journal of Systems Architecture,109。  new window
4.Zhang, L.、Zhang, H.、Yu, J.、Xian, H.(2020)。Blockchain-based two-party fair contract signing scheme。Information Sciences,535,142-155。  new window
5.Yuan, E.、Wang, L.、Cheng, S.、Ao, N.、Guo, Q.(2020)。A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks。Sensors,20(6)。  new window
6.Ying, B.、Nayak, A.(2019)。Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography。Journal of Network and Computer Applications,131,66-74。  new window
7.Yang, Y.、Chen, F.、Chen, J.、Zhang, Y.、Yung, K. L.(2019)。A secure hash function based on feedback iterative structure。Enterprise Information Systems,13(3),281-302。  new window
8.Xue, Y.、Tan, Y.、Liang, C.、Li, Y.、Zheng, J.、Zhang, Q.(2018)。RootAgency: A digital signature-based root privilege management agency for cloud terminal devices。Information Sciences,444,36-50。  new window
9.Wazid, M.、Das, A. K.、Bhat, V.、Vasilakos, A. V.(2020)。LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment。Journal of Network and Computer Applications,150。  new window
10.Teh, J. S.、Tan, K.、Alawida, M.(2019)。A chaos-based keyed hash function based on fixed point representation。Cluster Computing,22,649-660。  new window
11.Teh, J. S.、Samsudin, A.(2017)。A chaos-based authenticated cipher with associated data。Security and Communication Networks,2017。  new window
12.Sohal, A. S.、Sandhu, R.、Sood, S. K.、Chang, V.(2018)。A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments。Computers & Security,74,340-354。  new window
13.Shahid, F.、Khan, A.(2020)。Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers。Future Generation Computer Systems,111,241-253。  new window
14.Sepahi, R.、Steinfeld, R.、Pieprzyk, J.(2014)。Lattice-based certificateless public-key encryption in the standard model。International Journal of Information Security,13(4),315-333。  new window
15.Rahardja, U.、Sudaryono, S.、Santoso, N. P. L.、Faturahman, A.、Aini, Q.(2020)。Covid-19: Digital Signature Impact on Higher Education Motivation Performance。International Journal of Artificial Intelligence Research,4(1)。  new window
16.Ouyang, M.、Wang, Z.、Li, F.(2021)。Digital signature with cryptographic reverse firewalls。Journal of Systems Architecture,116。  new window
17.Nakhaei, K.、Ansari, F.、Ansari, E. J.(2020)。Signature: eliminating third‑party‑hosted JavaScript infection threats using digital signatures。SN Applied Sciences,2(4)。  new window
18.Mouha, N.、Raunak, M. S.、Kuhn, D. R.、Kacker, R.(2018)。Finding Bugs in Cryptographic Hash Function Implementations。IEEE Transactions on Reliability,67(3),870-884。  new window
19.Mezher, A. E.(2018)。Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys。International Journal of Electrical and Computer Engineering,8(5)。  new window
20.Malik, M.、Dutta, M.、Granjal, J.(2019)。A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things。IEEE Access,7,27443-27464。  new window
21.Lusetti, M.、Salsi, L.、Dallatana, A.(2020)。A blockchain based solution for the custody of digital files in forensic medicine。Forensic Science International: Digital Investigation,35。  new window
22.Lu, S.、Ostrovsky, R.、Sahai, A.、Shacham, H.、Waters, B.(2013)。Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles。Journal of Cryptology,26(2),340-373。  new window
23.Li, Y.、Li, X.、Liu, X.(2017)。A fast and efficient hash function based on generalized chaotic mapping with variable parameters。Neural Computing and Applications,28(6),1405-1415。  new window
24.Li, H.、Han, D.(2019)。EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme。IEEE Access,7,179273-179289。  new window
25.Kumar, P.、Chouhan, L.(2021)。A privacy and session key based authentication scheme for medical IoT networks。Computer Communications,166,154-164。  new window
26.Karati, A.、Islam, S. H.、Biswas, G.、Bhuiyan, M. Z. A.、Vijayakumar, P.、Karuppiah, M.(2018)。Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments。IEEE Internet of Things Journal,5(4),2904-2914。  new window
27.Kabra, N.、Bhattacharya, P.、Tanwar, S.、Tyagi, S.(2020)。MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions。Future Generation Computer Systems,102,574-587。  new window
28.Huang, Z.、Liu, S.、Mao, X.、Chen, K.、Li, J.(2017)。Insight of the protection for data security under selective opening attacks。Information Sciences,412,223-241。  new window
29.Hu, X.、Tan, W.、Xu, H.、Wang, J.、Ma, C.(2017)。Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications。Security and Communication Networks,2017。  new window
30.Höglund, J.、Lindemer, S.、Furuhed, M.、Raza, S.(2020)。PKI4IoT: Towards public key infrastructure for the Internet of Things。Computers & Security,89。  new window
31.He, D.、Zhang, Y.、Wang, D.、Choo, K. K. R.(2020)。Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography。IEEE Transactions on Dependable and Secure Computing,17(5),1124-1132。  new window
32.Gul, E.、Ozturk, S.(2019)。A novel hash function based fragile watermarking method for image integrity。Multimedia Tools and Applications,78,17701-17718。  new window
33.El-Rahman, S. A.、Aldawsari, D.、Aldosari, M.、Alrashed, O.、Alsubaie, G.(2018)。A Secure Cloud Based Digital Signature Application for IoT。International Journal of E-Services and Mobile Applications,10(3)。  new window
34.Elhabob, R.、Zhao, Y.、Sella, I.、Xiong, H.(2020)。An efficient certificateless public key cryptography with authorized equality test in IIoT。Journal of Ambient Intelligence and Humanized Computing,11,1065-1083。  new window
35.Chong, K. W.、Kim, Y. S.、Choi, J.(2021)。A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service。Information,12(2)。  new window
36.Cui, H.、Qin, B.、Susilo, W.、Nepal, S.(2020)。Robust digital signature revisited。Theoretical Computer Science,844,87-96。  new window
37.Dey, S.、Hossain, A.(2019)。Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography。IEEE Sensors Letters,3(4)。  new window
38.Duong, D. H.、Susilo, W.、Trinh, V. C.(2020)。A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme。Information,11(5)。  new window
39.Bralić, V.、Stančić, H.、Stengård, M.(2020)。A blockchain approach to digital archiving: digital signature certification chain preservation。Records Management Journal,30(3),345-362。  new window
40.Banerjee, S.、Odelu, V.、Das, A. K.、Chattopadhyay, S.、Kumar, N.、Park, Y.、Tanwar, S.(2018)。Design of an anonymity-preserving group formation based authentication protocol in global mobility networks。IEEE Access,6,20673-20693。  new window
41.Akter, S.、Michael, K.、Uddin, M. R.、McCarthy, G.、Rahman, M.(2022)。Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics。Annals of Operations Research,308,7-39。  new window
42.Alawida, M.、Teh, T. S.、Oyinloye, D. P.、Alshoura, W. H.、Ahmad, M.、Alkhawaldeh, R. S.(2020)。A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata。IEEE Access,8,113163-113174。  new window
會議論文
1.Santini, P.、Baldi, M.、Chiaraluce, F.(2019)。Cryptanalysis of a One-Time Code-Based Digital Signature Scheme。2019 IEEE International Symposium on Information Theory,2594-2598。  new window
2.Kuznetsov, A.、Svatovskij, I.、Kiyan, N.、Pushkáov, A.(2017)。Code-based public-key cryptosystems for the post-quantum period。2017 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology,125-130。  new window
3.Kuznetsov, A.、Pushkaŕov, A.、Kiyan, N.、Kuznetsova, T.(2018)。Code-Based Electronic Digital Signature。The 9th IEEE International Conference on Dependable Systems, Services and Technologies,(會議日期: 24-27 May, 2018),331-336。  new window
4.Kazmirchuk, S.、Ilyenko, A.、Ilyenko, S.(2019)。Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves。ICCSEEA 2019,279-288。  new window
5.Géraud, R.、Naccache, D.、Rosie, R.(2019)。Robust encryption, extended。The Cryptographers' Track at the RSA Conference 2019,(會議日期: March 4-8, 2019),149-168。  new window
6.Dzhangarov, I.、Suleymanova, M. A.(2020)。Electronic digital signature。IOP Conference。  new window
7.Afrianto, I.、Heryandi, A.、Finandhita, A.、Atin, S.(2019)。E-Document Authentication With Digital Signature For Smart City: Reference Model。The 2nd ASEAN Workshop on Information Science and Technology,Universitas Komputer Indonesia 。  new window
8.Girault, M.(1991)。Self-certified Public Keys。The 10th Annual International Conference on Theory and Application of Cryptographic Techniques。Springer-Verlag。490-497。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關期刊論文
 
無相關著作
 
QR Code
QRCODE