A Cross-Chain Mechanism for Agricultural Engineering Document Management Blockchain in the Context of Big Data

L Shi, Y Zhou, W Wang, J Wang, Y Bai, C Peng… - Big Data Research, 2024 - Elsevier
Cross-chain mechanism functions as typical approaches for information interaction between
diverse blockchains tackling the problem of information silos in the big data era. Most of the …

Employees' aptitudes and trepidations for the adoption of enterprise application architecture for supply chain management in small and medium enterprises: A case of …

KXT Lamola - Journal of Transport and Supply Chain Management, 2022 - journals.co.za
Background This article inspects the internal constituents on employees' aptitudes and
trepidations (EATs) for the adoption of enterprise application architecture (EAA) for supply …

Application of AES and DES Algorithms in File Management

Y Wang - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
In recent years, with the rapid development of computer and network technology, major
enterprises and institutions have successively popularized the use of computer for office …

Network Security Threat Situation Recognition Based on Attack and Defense Game Model

B Liu - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
At present, network security is a problem that needs to be solved urgently in the current
network era. In order to reduce the loss caused by network security threats, and also use …

Research on Identity Authentication of IoT Devices based on Blockchain

M Chen, M Qin, Y Huang, Z Liang… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
Identity authentication is one of the methods to protect the security of devices in the Internet
of Things. In view of the security and privacy protection problems caused by identity …