[1] |
中华人民共和国国家邮政局.中国快递发展指数报告[R]. 2018.
|
|
State Post bureau of the People's Republic of China. China Express Development Index Report[R]. 2018.
|
[2] |
严文博, 姚远志, 张卫明 ,等. 基于二维码和信息隐藏的物流系统隐私保护方案[J]. 网络与信息安全学报, 2017,3(11): 22-28.
|
|
YAN W B , YAO Y Z , ZHANG W M ,et al. Privacy-preserving scheme for logistics systems based on 2D code and information hiding[J]. Chinese Journal of Network and Information Security, 2017,3(11): 22-28.
|
[3] |
TAMM U , . Possible applications of information theory in logistics[C]// Information Theory & Applications Workshop. 2011.
|
[4] |
?MüR Y , SAAT?IO?LU , DEVECI D A , CERIT A G . Logistics and transportation information systems in turkey:e-government perspectives[J]. Transforming Government People Process & Policy, 2009,3(2): 144-162.
|
[5] |
BRYCE J , KLANG M . Young people,disclosure of personal information and online privacy:control,choice and consequences[J]. Information Security Technical Report, 2009,14(3): 160-166.
|
[6] |
ZHANG X , LI H , YANG Y ,et al. LIPPS:logistics information privacy protection system based on encrypted QR code[C]// IEEE Trustcom/BigDataSE/ISPA. 2016: 96-100.
|
[7] |
THIRANANTN , LEE Y S , LEE H . Performance comparison between RSA and elliptic curve cryptography-based QR code authentication[C]// IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2015: 278-282.
|
[8] |
BOOKBINDER , JAMES H , DILTS D . Logistics information systems in a just-in-time environment[J]. Journal of Business Logistics, 1989,10(1).
|
[9] |
BERGHEL H . Identity theft,social security numbers,and the Web[J]. Communications of the ACM, 2000,43(2).
|
[10] |
HUANG C T , ZHANG Y H , LIN L C ,et al. Mutual authentications to parties with QR-code applications in mobile systems[J]. International Journal of Information Security, 2016.
|
[11] |
SAXENA S , SANYAL G AND SRIVASTAVA S . Mutual authentication protocol using identity-based shared secret key in cloud environments[C]// International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014). 2014: 1-6.
|
[12] |
KROMBHOLZK P , FRüHWIRT P , PETER , KIESEBERG P .et al. QR code security:a survey of attacks and challenges for usable security[C]// International Conference on Human Aspects of Information Security. 2014.
|