Semantic Filter
show all semantic filters
Found 8 articles
  • A blockchain-based framework of cross-border e-commerce supply chain

    PDF

    2020 | International Journal of Information Management | Citations: 0

    Authors: Liu, Zhiyong; Li, Zipei

    Abstract: Blockchain technology provides us a new tool to solve the product traceability p ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: blockchain supply chain management electronic commerce public key encryption Diffie-Hellman key exchange

    Methods: computational algorithm theory development case study

  • Document Verification using Blockchain for Trusted CV Information

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Marella, Venkata; Vijayan, Anoop

    Abstract: With the changing landscape of the job market, it is very difficult to secure a ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: blockchain Advanced Encryption Standard information privacy law Python privacy

    Methods: design science computational algorithm design artifact design process

  • Shortening Delivery Times by Predicting Customers' Online Purchases: a Case Study in the Fashion Industry

    2020 | HICSS | Citations: 0

    Authors: Weingarten, Jennifer; Spinler, Stefan

    Abstract: Online retailers still struggle with the disadvantage of delivery times compared ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: logistics management electronic commerce website data quality Advanced Encryption Standard

    Methods: support vector machine random forest classification computational algorithm logistic regression binary classification

  • Evolution of Format Preserving Encryption on IoT Devices: FF1+

    2019 | HICSS | Citations: 0

    Authors: Baccarini, Alessandro N; Hayajneh, Thaier

    Abstract: The Internet of Things (IoT) is a network of interconnected low-power sensing de ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: data encryption internet of things mobile system cryptanalysis Advanced Encryption Standard

    Methods: computational algorithm

  • BPDIMS:A Blockchain-based Personal Data and Identity Management System

    2019 | HICSS | Citations: 0

    Authors: Faber, Benedict; Michelet, Georg; Weidmann, Niklas; Mukkamala, Raghava Rao; Vatrapu, Ravi

    Abstract: Recent scandals on the abuse of personal information from social media platforms ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: blockchain identity management General Data Protection Regulation legal context data encryption

    Methods: archival research computational algorithm design artifact design guideline design science

  • Big Data SAVE: Secure Anonymous Vault Environment

    2019 | HICSS | Citations: 1

    Authors: Soliman, Omar H

    Abstract: There has been great progress in taming the volume, velocity and variation of Bi ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: electronic authentication data encryption Advanced Encryption Standard big data computer data storage

    Methods: simulation computational algorithm

  • SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud

    PDF

    2017 | International Journal of Information Management | Citations: 0

    Authors: Ahmadian, Mohammad; Plochan, Frank; Roessler, Zak; Marinescu, Dan C.

    Abstract: a b s t r a c t While many schemes have been proposed to search encrypted relat ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: database system data encryption nosql database cloud computing MongoDB

    Methods: data modeling computational algorithm experiment literature study design artifact

  • Effective distributed service architecture for ubiquitous video surveillance

    PDF

    2012 | Information Systems Frontiers | Citations: 1

    Authors: Chang, Ray-I; Wang, Te-Chih; Wang, Chia-Hui; Liu, Jen-Chang; Ho, Jan-Ming

    Abstract: Video surveillance systems are playing an important role to protect lives and as ... Expand

    Semantic filters: Advanced Encryption Standard

    Topics: internet technology privacy Advanced Encryption Standard IT security threat wireless LAN

    Methods: experiment simulation design artifact support vector machine