Abstract: This article elaborates on the design and development of a secure intelligence interaction system on the basis of encryption algorithms SM2, SM3 and SM4. The backend of the system is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results