|
英文文獻 [1] Bidgoli, H. (2004). Computer Literacy. The Internet Encyclopedia/Bidgoli, H.(Ed.). Hoboken: John Wiley & Sons, Inc, 1(1), 229-241. [2] Mubarak, A. R., Rohde, A., & Pakulski, P. (2009). The social benefits of online chat rooms for university students: An explorative study. Journal of higher education policy and management, 31(2), 161-174. [3] Shuang, K., & Feng, K. (2013). Research on Server Push Methods in Web Browser based Instant Messaging Applications. J. Softw., 8(10), 2644-2651. [4] Wang, V., Salim, F., Moskovits, P., Wang, V., Salim, F., & Moskovits, P. (2013). Building Instant Messaging and Chat over WebSocket with XMPP. The Definitive Guide to HTML5 WebSocket, 61-83. [5] Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7). [6] Caffery, L. J., & Smith, A. C. (2010). A transmission security framework for email-based telemedicine. In Global Telehealth (pp. 35-48). IOS Press. [7] Rathidevi, M., Yaminipriya, R., & Sudha, S. V. (2017, March). Trends of cryptography stepping from ancient to modern. In 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT) (pp. 1-9). IEEE. [8] Abd Elminaam, D. S., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating The Performance of Symmetric Encryption Algorithms. International Journal of Network Security, 10(3), 216-222. [9] Blaze, M., Diffie, W., Rivest, R. L., Schneier, B., Shimomura, T., Thompson, E., & Wiener, M. (1996). Minimal key lengths for symmetric ciphers to provide adequate commercial security: A report by an ad hoc group of cryptographers and computer scientists. Technical report, January 1996. [10] Delfs, H., Knebl, H., Delfs, H., & Knebl, H. (2015). Symmetric-key cryptography. Introduction to Cryptography: Principles and Applications, 11-48. [11] Weerasinghe, T. B. (2014). Secrecy and performance analysis of symmetric key encryption algorithms. Cryptology ePrint Archive. [12] Pandey, C. (2020). Design and analysis of a secure hardware implementation for cryptography applications. Journal of Contemporary Research Review, 7(8), 3935-3942. [13] Lalem, F., Laouid, A., Kara, M., Al-Khalidi, M., & Eleyan, A. (2023). A novel digital signature scheme for advanced asymmetric encryption techniques. Applied Sciences, 13(8), 5172. [14] Tian, Q., Kang, H., Ai, T., & Fei, L. (2018, May). Analysis and Comparison of Network Information Security Encryption Technology. In 2018 3rd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2018) (pp. 678-682). Atlantis Press. [15] Simmons, G. J. (1979). Symmetric and asymmetric encryption. ACM Computing Surveys (CSUR), 11(4), 305-330. [16] Naik, K., & Wei, D. S. (2001). Software implementation strategies for power-conscious systems. Mobile Networks and Applications, 6, 291-305. [17] Nadeem, A., & Javed, M. Y. (2005, August). A performance comparison of data encryption algorithms. In 2005 international Conference on information and communication technologies (pp. 84-89). IEEE. [18] Sung, B. Y., Kim, K. B., & Shin, K. W. (2018, January). An AES-GCM authenticated encryption crypto-core for IoT security. In 2018 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-3). IEEE. [19] Wang, S. (2006). An architecture for the AES-GCM security standard (Master's thesis, University of Waterloo). [20] Kaushik, A. (2013). Extended Diffie-Hellman algorithm for key exchange and management. International Journal of Advanced Engineering Sciences, 3(3), 67-70. [21] Avestro, J. E., Sison, A. M., & Medina, R. P. (2019, November). Hybrid Algorithm Combining Modified Diffie Hellman and RSA. In 2019 IEEE 4th International Conference on Technology, Informatics, Management, Engineering & Environment (TIME-E) (pp. 100-104). IEEE. [22] Flores-Carapia, R., Silva-García, V. M., & Cardona-López, M. A. (2023). A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application. Applied Sciences, 13(12), 7168. [23] Harn, L., & Lin, C. (2010). Authenticated group key transfer protocol based on secret sharing. IEEE transactions on computers, 59(6), 842-846. [24] The Vue.js Team. (n.d.). Vue.js. Retrieved from https://vuejs.org/ [25] Kumpulainen, T. (2021). Web application development with Vue. js. [26] Song, J., Zhang, M., & Xie, H. (2019). Design and implementation of a vue. js-based college teaching system. International Journal of Emerging Technologies in Learning (Online), 14(13), 59. [27] Anderson, C. (2012). The model-view-viewmodel (mvvm) design pattern. In Pro Business Applications with Silverlight 5 (pp. 461-499). Berkeley, CA: Apress. [28] Li, N., & Zhang, B. (2021, April). The research on single page application front-end development based on Vue. In Journal of Physics: Conference Series (Vol. 1883, No. 1, p. 012030). IOP Publishing. [29] Hickson, I., Berjon, R., Faulkner, S., Leithead, T., Navara, E. D., O’Connor, E., & Pfeiffer, S. (2014). Html5 specification. World Wide Web Consortium. [30] Verdú, J., & Pajuelo, A. (2015). Performance scalability analysis of javascript applications with web workers. IEEE Computer Architecture Letters, 15(2), 105-108. [31] Okamoto, S., & Kohana, M. (2010, November). Load distribution by using web workers for a real-time web application. In Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (pp. 592-597). [32] Guntupally, K., Devarakonda, R., & Kehoe, K. (2018, December). Spring boot based REST API to improve data quality report generation for big scientific data: ARM data center example. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 5328-5329). IEEE. [33] Singhal, R. (2022). Spring boot backend development. Int. J. Adv. Res. Sci. Commun. Technol.(IJARSCT), 2(5). [34] Benet, J. (2014). Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561. [35] Guidi, B., Michienzi, A., & Ricci, L. (2021, January). Data persistence in decentralized social applications: The ipfs approach. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC) (pp. 1-4). IEEE. [36] IPFS. (n.d.). Retrieved from https://docs.ipfs.tech/ [37] Vimal, S., & Srivatsa, S. K. (2019). A new cluster P2P file sharing system based on IPFS and blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 1-7. [38] Jones, M., Bradley, J., & Sakimura, N. (2015). Json web token (jwt) (No. rfc7519).
|