2022
DOI: 10.23919/saiee.2022.9695425
|View full text |Cite
|
Sign up to set email alerts
|

Personal Information Two-dimensional Code Encryption Technology in the Process of E-commerce Logistics Transportation

Abstract: The popularity of the Internet has given birth to e-commerce and promoted the development of logistics industry. Traditional logistics is frail in personal information confidentiality, and it is easy to leak privacy information in the process of logistics. This paper briefly introduced the channels of privacy information disclosure in the process of e-commerce logistics and the privacy information encryption system based on two-dimensional code. Then, the privacy protective effect of the system was tested on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
0
0
Order By: Relevance
“…The sender utilizes K s1 to authenticate to the logistics company that initiates the order and uses the private key to digitally sign the intended shipping address denoted as addressfrom. The sender specifies the receive as K r1 and then computes R s and sends it to the receiver, as shown in Equation (5).…”
Section: Identity Registration: One-time-use Accountsmentioning
confidence: 99%
See 1 more Smart Citation
“…The sender utilizes K s1 to authenticate to the logistics company that initiates the order and uses the private key to digitally sign the intended shipping address denoted as addressfrom. The sender specifies the receive as K r1 and then computes R s and sends it to the receiver, as shown in Equation (5).…”
Section: Identity Registration: One-time-use Accountsmentioning
confidence: 99%
“…Hiding critical information is fundamentally a data desensitization technique, where sensitive data is substituted with arbitrary characters or symbols, thereby diminishing the risk of privacy breaches. Schemes [5][6][7][8] utilize hiding critical information, and the customer's personal and logistics information is encapsulated in the QR code. However, the main limitation of hiding critical information is that the data are still stored in plaintext in the company database, which intensifies the susceptibility to breaches of user identity privacy.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, scholars have studied the development direction of the supply chain and concluded that the development of the supply chain will develop in the direction of greening, agility, and informationization [16][17]. Ma, C. M. [18] put forward the concept of a green supply chain.…”
Section: Introductionmentioning
confidence: 99%