Open Access
Issue |
E3S Web Conf.
Volume 233, 2021
2020 2nd International Academic Exchange Conference on Science and Technology Innovation (IAECST 2020)
|
|
---|---|---|
Article Number | 01082 | |
Number of page(s) | 5 | |
Section | NESEE2020-New Energy Science and Environmental Engineering | |
DOI | https://doi.org/10.1051/e3sconf/202123301082 | |
Published online | 27 January 2021 |
- Yaojun Shan, Jin Bai, Xiaoqian Ye, Wei Li. Application of QR Two-dimension Code Technology in Credits Certification System[A]. Information Engineering Research Institute, USA. Proceedings of 2013 the Second International Conference on Innovative Computing and Cloud Computing (ICCC 2013) [C]. Information Engineering Research Institute, USA,2013,3. [Google Scholar]
- Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung. A One-Time Password Scheme with QR-Code Based on Mobile Phone[J]. IEEE Conference, 2014,24(3): 2069-2071. [Google Scholar]
- Huang Zhenjian & Cai Qunying, Application of QR Code Encoding and Decoding Based on Web[J], Computer Knowledge and Technology, 2014, 10(24): 5671-5672. [Google Scholar]
- Yong-feng Huang, Zhen Xue, Cai-rong Yan. Research of Localization Algorithm Based on Multi-QR Code[A]. Research Institute of Management Science and Industrial Engineering. Proceedings of 2017 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017) [C]. Research Institute of Management Science and lndustriai Engineering, 2017, 4. [Google Scholar]
- Jia Xu, Saftey Analysis and Its Optimization and Improvement of AES Algorithm [D]. Jilin University, 2010. [Google Scholar]
- LiQuan Han, Fang Yuan, ZhengChao Xu. A strong-security protocol based on AES algorithm for passive RFID tags[A]. Information Engineering Research Institute, USA. Proceedings of the 2014 Pacific-Asia Workshop on Computer Science in lndustrial Application (ClIA201 4) [C]. Information Engineering Research Institute, USA, 2014, 7. [Google Scholar]
- Zhang Xiaoyu, Chen Kaiyan, Zhang Yang, Gui Weilong, Li Lei. Correlation power analysis for AES encryption device[A]. International Informatization and Engineering Associations, Atlantis Press. Proceedings of 2015 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) [C]. International Informatization and Engineering Associations, Atlantis Press,2015,7. [Google Scholar]
- Ren Wenping, Zhang Wenyong, He Jiqin, Shen Dongya. An improved method about AES and FPGA high-speed realize[A]. lEEE Computer Society. Proceedings of 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS 2016) [C].IEEE Computer Society, 2016, 4. [Google Scholar]
- Zhou Jiahua, Design and Implementation of QR Code Encryption System Based on ARM [D]. Fuzhou University, 2018. [Google Scholar]
- Zhang Xiaomei, Optimization and Implementation of AES Algorithm in the ARM Embedded System [J]. Computer Application and Software, 2012, 29(05): 285-288. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.