Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code
Gespeichert in:
| Titel: | Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code |
|---|---|
| Autoren: | Lu, Liuyi |
| Quelle: | Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081 |
| Verlagsinformationen: | PiscoMed Publishing Pte Ltd |
| Publikationsjahr: | 2020 |
| Schlagwörter: | AES Algorithm, RSA Algorithm, Two-Dimensional Code, Encryption, Security |
| Beschreibung: | Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes. |
| Publikationsart: | article in journal/newspaper |
| Dateibeschreibung: | application/pdf |
| Sprache: | English |
| Relation: | https://insight.piscomed.com/index.php/II/article/view/365/273; https://insight.piscomed.com/index.php/II/article/view/365 |
| DOI: | 10.18282/ii.v2i2.365 |
| Verfügbarkeit: | https://insight.piscomed.com/index.php/II/article/view/365 https://doi.org/10.18282/ii.v2i2.365 |
| Rights: | Copyright (c) 2020 Liuyi Lu ; https://creativecommons.org/licenses/by-nc/4.0 |
| Dokumentencode: | edsbas.BC8DBB8A |
| Datenbank: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://insight.piscomed.com/index.php/II/article/view/365# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Lu%20L Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.BC8DBB8A RelevancyScore: 905 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 905.017944335938 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Lu%2C+Liuyi%22">Lu, Liuyi</searchLink> – Name: TitleSource Label: Source Group: Src Data: Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081 – Name: Publisher Label: Publisher Information Group: PubInfo Data: PiscoMed Publishing Pte Ltd – Name: DatePubCY Label: Publication Year Group: Date Data: 2020 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22AES+Algorithm%22">AES Algorithm</searchLink><br /><searchLink fieldCode="DE" term="%22RSA+Algorithm%22">RSA Algorithm</searchLink><br /><searchLink fieldCode="DE" term="%22Two-Dimensional+Code%22">Two-Dimensional Code</searchLink><br /><searchLink fieldCode="DE" term="%22Encryption%22">Encryption</searchLink><br /><searchLink fieldCode="DE" term="%22Security%22">Security</searchLink> – Name: Abstract Label: Description Group: Ab Data: Two-dimensional code is widely used in daily life, and security issues are increasingly prominent. In order to improve the security and use of two-dimensional code information, the anti-counterfeiting technology based on encrypted two-dimensional code is studied. At first, this article discusses the security problems faced by two-dimensional code in the application process, and analyzes digital security technology, and compares the performance of different encryption algorithms. This algorithm not only effectively enhances the security of the system and reduces the chances of key information theft and tampering, but also ensures the generation and recognition speed of two-dimensional codes. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://insight.piscomed.com/index.php/II/article/view/365/273; https://insight.piscomed.com/index.php/II/article/view/365 – Name: DOI Label: DOI Group: ID Data: 10.18282/ii.v2i2.365 – Name: URL Label: Availability Group: URL Data: https://insight.piscomed.com/index.php/II/article/view/365<br />https://doi.org/10.18282/ii.v2i2.365 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2020 Liuyi Lu ; https://creativecommons.org/licenses/by-nc/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.BC8DBB8A |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.BC8DBB8A |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.18282/ii.v2i2.365 Languages: – Text: English Subjects: – SubjectFull: AES Algorithm Type: general – SubjectFull: RSA Algorithm Type: general – SubjectFull: Two-Dimensional Code Type: general – SubjectFull: Encryption Type: general – SubjectFull: Security Type: general Titles: – TitleFull: Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Lu, Liuyi IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2020 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Insight - Information; Vol. 2 No. 2 (2020) ; 2661-4081 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science