This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
Bynens, M, PBKDF2+HMAC hash collisions explained. https://mathiasbynens.be/notes/pbkdf2-hmac (March 25, 2014).Search in Google Scholar
Davies, J. Understanding CRC32. https://commandlinefanatic.com/cgibin/showarticle.cgi?article=art008 (December 10, 2023).Search in Google Scholar
De Groot, J., What Is Data Encryption? (Definition, Best Practices & More). https://www.digitalguardian.com/blog/what-data-encryption (December 10, 2023).Search in Google Scholar
Fisher T., What Is a Checksum? See a Definition, Examples, and More. Lifewire. https://www.lifewire.com/what-does-checksum-mean-2625825 (December 10, 2023).Search in Google Scholar
Hetler, A, Common Social Media Privacy Issues. WhatIs.com. https://www.techtarget.com/whatis/feature/6-common-social-media-privacy-issues (October 14, 2023).Search in Google Scholar
Kerner, S., M., What Is Data Validation? Data Management. https://www.techtarget.com/searchdatamanagement/definition/data-validation (December 9, 2023).Search in Google Scholar
Loshin, P., What Is Encryption and How Does It Work? Security. https://www.techtarget.com/searchsecurity/definition/encryption (December 10, 2023).Search in Google Scholar
Neri, A, ‘We Should Treat Data as a Natural Resource. Here’s Why’. World Economic Forum. https://www.weforum.org/agenda/2020/03/we-should-treat-data-as-a-natural-resource-heres-why/ (December 10, 2023).Search in Google Scholar
‘https://en.wikipedia.org/w/index.php?title=Adler-32&oldid=1146207638 (December 10, 2023).Search in Google Scholar
What Is Data Validation?’ Astera. https://www.astera.com/knowledge-center/what-is-data-validation/ (December 9, 2023).Search in Google Scholar
Fundamental Difference Between Hashing and Encryption Algorithms | Baeldung on Computer Science. https://www.baeldung.com/cs/hashing-vs-encryption (December 10, 2023).Search in Google Scholar
Encryption: ECDSA vs. RSA Keys | Baeldung on Computer Science. https://www.baeldung.com/cs/encryption-asymmetric-algorithms (December 10, 2023).Search in Google Scholar
Fletcher’s Checksum. https://www.tutorialspoint.com/fletcher-s-checksum (December 10, 2023). DOI: 10.2478/ijasitels-2023-0008Search in Google Scholar
What Is a Checksum? An Easy-to-Understand Checksum Definition. Code Signing Store. https://codesigningstore.com/what-is-checksum-how-it-works (December 10, 2023).Search in Google Scholar
QR Code Model 1 and Model 2: Point for setting the module size. https://www.qrcode.com/en/howto/cell.html (May 4, 2013).Search in Google Scholar
The JSON Data Interchange Syntax. https://www.ecma-international.org/wp-content/uploads/ECMA-404_2nd_edition_december_2017.pdf (December, 2017)Search in Google Scholar
What Is RSA? How Does an RSA Work? | Encryption Consulting. https://www.encryptionconsulting.com/education-center/what-is-rsa/ (December 10, 2023).Search in Google Scholar
Data Protection under GDPR. https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr/index_en.htm (December 10, 2023).Search in Google Scholar
eHealth Network Guidelines on Technical Specifications for EU Digital COVID Certificates | Volume 2’. https://health.ec.europa.eu/system/files/2022-07/digital-covid-certificates_v2_en.pdf (June 15, 2022).Search in Google Scholar
What Is Data Encryption? https://www.forcepoint.com/cyber-edu/data-encryption (December 10, 2023).Search in Google Scholar
What Is Encryption and How Does It Work?’ Google Cloud. https://cloud.google.com/learn/what-is-encryption (December 10, 2023).Search in Google Scholar
What Is Encryption? Data Encryption Defined. https://www.ibm.com/topics/encryption (December 10, 2023).Search in Google Scholar
What Is Data Validation: Definition. https://www.informatica.com/services-and-training/glossary-of-terms/data-validation-definition.html (December 9, 2023).Search in Google Scholar
‘HMACSHA1 Class (System.Security.Cryptography)’. https://learn.microsoft.com/enus/dotnet/api/system.security.cryptography.hmacsha1?view=net-8.0 (December 10, 2023).Search in Google Scholar
Hashing Algorithm Overview: Types, Methodologies & Usage. https://www.okta.com/identity-101/hashing-algorithms/ (December 10, 2023).Search in Google Scholar
OpenID Connect Basic Client Implementer’s Guide 1.0 - draft 46’. https://openid.net/specs/openid-connect-basic-1_0.html (October 28, 2023).Search in Google Scholar
veritas.com. ‘What Is RSA Encryption?’ https://www.veritas.com/information-center/rsa-encryption (December 10, 2023).Search in Google Scholar