scholarly journals Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Fei Yao

The previous encryption methods of hospital financial data have the problem of overburden. Therefore, a research study on hybrid encryption of hospital financial data based on Noekeon algorithm is proposed. From the basic principles of the Noekeon algorithm and the application and implementation of the Noekeon algorithm, a hybrid encryption scheme for hospital financial data based on the Noekeon algorithm is designed. In order to improve the security of the encryption system, the RSA algorithm is used to encrypt the encrypted content twice. The hybrid algorithm realizes the hybrid encryption of the hospital's financial data. Finally, a hybrid encryption system for hospital financial data based on Noekeon algorithm is designed. Experimental results show that this method has a higher success rate and better comprehensive performance. It not only improves the encryption efficiency of hospital financial data but also enhances the security of hospital financial data, which has greater application value.

Author(s):  
Yunfeng Wang ◽  
Xing Zheng ◽  
Jing wang ◽  
Donghui Guo

2012 ◽  
Vol 241-244 ◽  
pp. 1737-1740
Author(s):  
Wei Chen

The immune genetic algorithm is a kind of heuristic algorithm which simulates the biological immune system and introduces the genetic operator to its immune operator. Conquering the inherent defects of genetic algorithm that the convergence direction can not be easily controlled so as to result in the prematureness;it is characterized by a better global search and memory ability. The basic principles and solving steps of the immune genetic algorithm are briefly introduced in this paper. The immune genetic algorithm is applied to the survey data processing and experimental results show that this method can be practicably and effectively applied to the survey data processing.


2021 ◽  
Vol 10 (02) ◽  
pp. 225-231
Author(s):  
V.Selva Bhuvaneshwari ◽  
D.Angeline Rangithamani ◽  
K.Aathi Vignesh

E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device records all voting transactions to prevent voter frauds.The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes.The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number.


2021 ◽  
pp. 122-146
Author(s):  
Matthew Johnson ◽  
Jeffrey M. Bradshaw

AbstractCurrent attempts to understand human-machine systems are complex and unwieldy. Multiple disciplines throw different concepts and constructs at the problem, but there is no agreed-to framework to assemble these interrelated moving parts into a coherent system. We propose interdependence as the common factor that unifies and explains these moving parts and undergirds the different terms people use to talk about them. In this chapter, we will describe a sound and practical theoretical framework based on interdependence that enables researchers to predict and explain experimental results in terms of interlocking relationships among well-defined operational principles. Our exposition is not intended to be exhaustive, but instead aims to describe the basic principles in a way that allows the gist to be grasped by a broad cross-disciplinary audience through simple illustrations.


Time-lock encryption is a type of encryption in which the process is bound by a factor of time that enables previously impossible applications such as secure auctions, mortgage payment, key escrow, or fair multiparty computations. Existing solution approaches of time lock either employ computational overhead to calculate time or use analogues to map the real-world time, hence lacks reliability. We propose a reliable time-lock encryption scheme, where even receivers with relatively weak computational resources can decrypt the cipher after an accurate real-world deadline, without any interaction with the sender. Proposed solution uses time fetched from timeservers over secured https channel for time lock accuracy and strong AES-256 encryption/decryption techniques for reliability. The paper briefly discusses a java based prototype implementation of the proposed approach and the experimental results


2021 ◽  
Vol 127 (8) ◽  
Author(s):  
Kang Yi ◽  
Zhang Leihong ◽  
Ye Hualong ◽  
Zhang Dawei

Author(s):  
David Sammon ◽  
Frédéric Adam ◽  
Kevin Higgins ◽  
Mark Synnott

Over the last 30 years, the enterprise-wide systems movement has been gathering momentum and has now reached a global dimension, with companies across the world and, more importantly, across very different industries jumping on the ERP/SCM/CRM bandwagon. The pace of implementations has been such that SAP alone have now implemented their software in 30,000 sites and have a user population well in excess of 10 million. However, studies carried out since the ERP epidemic broke out have revealed that the rationale pursued by managers in acquiring ERP packages has sometimes been weak and not well informed. Moreover, the track record of ERP implementations has not been good with many examples of implementation failures. It is our contention that the problems reported in ERP projects are due to a failure to link the business model underlying ERP packages and the unique assets of organisations. In this research study, we carried out two in-depth case studies of organisations having just implemented ERP packages and focused on the preparation stage of their projects. We also carried out a survey of organisations having implemented ERP to confirm quantitatively how well managers prepare themselves for ERP. Based on these, we uncover patterns of ERP project preparation which may explain the low success rate of ERP projects and put forward some proposals which should help managers and researchers to increase the likelihood that ERP projects are successful.


Sign in / Sign up

Export Citation Format

Share Document