2017
DOI: 10.1080/09720529.2015.1130474
|View full text |Cite
|
Sign up to set email alerts
|

On ordered bi-Γ-ideals in ordered Γ-semigroups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…It is characterized by the security factor to judge whether the reversible hidden data access is secure. The closer the security factor is to 1, the more secure the data access algorithm represents [1,3,20,23,25]. Whether the security of the algorithm proposed in this paper can meet the requirement of reversible hidden data access, it is given in the experiment.…”
Section: Reversible Hidden Data Location In Cloud Computing Environmentmentioning
confidence: 99%
“…It is characterized by the security factor to judge whether the reversible hidden data access is secure. The closer the security factor is to 1, the more secure the data access algorithm represents [1,3,20,23,25]. Whether the security of the algorithm proposed in this paper can meet the requirement of reversible hidden data access, it is given in the experiment.…”
Section: Reversible Hidden Data Location In Cloud Computing Environmentmentioning
confidence: 99%
“…Recently, Basar et.al. obtained various types of hyperideals in ordered semihypergroups, ordered LA-Γ-semigroups and LA-Γ-semihypergroups [18]- [20].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, many mutual authentication protocols between one reader and one tag have been proposed, such as the protocols based on Hash function [2,15,16,18], the protocols based on logical bit operations [6,7,10,17], the protocols based on CRC [1,3,9,14,19], the protocols based on ECC [4,8], and so on. However, when…”
mentioning
confidence: 99%