2021
DOI: 10.1155/2021/7212688
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm

Abstract: With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…All the experimental result is shown and gured linearly between 3DES, DES in [12], and DH-KELA. The avalanche effect is presented a better performance in maximum conditions.…”
Section: Avalanche Effect Same Keys With Changed a Single Bit Of Textmentioning
confidence: 89%
See 3 more Smart Citations
“…All the experimental result is shown and gured linearly between 3DES, DES in [12], and DH-KELA. The avalanche effect is presented a better performance in maximum conditions.…”
Section: Avalanche Effect Same Keys With Changed a Single Bit Of Textmentioning
confidence: 89%
“…The comparative analysis calculated in different patterns of the proposed algorithm DH-KELA and compared with information-hiding techniques 3DES, DES [12], and modi ed AES [13]. Let the original text is "abcdefgh" with decimal value {97, 98, 99, 100, 101, 102, 103, 104} and the total numbers of bits 64 in given text.…”
Section: Comparative Analysis Of the Proposed Methodology And Other R...mentioning
confidence: 99%
See 2 more Smart Citations
“…Specifically, the migration controller is used to encrypt the data. The primary function of the migration controller is to decide which data to encrypt and directly selects the data with encryption requirements (Chen, 2021). The data selection process of the traditional target server is more complex, and the migration controller has the advantage of a light workload.…”
Section: Controller Module Selectionmentioning
confidence: 99%