Research on Network Security and Data Encryption

被引:0
作者
Duan, Zhongqi [1 ]
Xue, Xiaofeng [2 ]
机构
[1] Changzhou Univ, Sch Informat Sci & Engn, Changzhou, Peoples R China
[2] Jiangsu Teachers Univ Technol, Sch Comp Engn, Changzhou, Peoples R China
来源
INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2 | 2011年 / 50-51卷
关键词
network security; access control; data encryption; network firewall;
D O I
10.4028/www.scientific.net/AMM.50-51.531
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In the old days of the mainframe, information was centralized so security was not as big an issue. Nowadays, with the advent of information being distributed across many servers located in different areas, security is a major concern. Protecting the information is a high priority. A network with a good accounting and auditing system will ensure that all activities are logged, thereby enabling malicious activity to be detected.
引用
收藏
页码:531 / +
页数:2
相关论文
共 50 条
  • [21] Data Encryption and Transmission Technology for Cotton of IoT Security
    Zhao, Xiaodong
    Qi, Lin
    Li, Yajing
    Chen, Junxia
    Shen, Huanhuan
    LISS 2014, 2015, : 1695 - 1701
  • [22] Security technology of a wireless sensor network based on chaotic encryption
    Hu, Yuxiang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 623 - 627
  • [23] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587
  • [24] The Research of Network Security Solutions
    Tian, Jin
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 922 - 925
  • [25] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [26] Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud
    Qureshi, Muhammad Bilal
    Qureshi, Muhammad Shuaib
    Tahir, Saqib
    Anwar, Aamir
    Hussain, Saddam
    Uddin, Mueen
    Chen, Chin-Ling
    SYMMETRY-BASEL, 2022, 14 (04):
  • [27] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [28] Data Driven Data Center Network Security
    Jeyakumar, Vimalkumar
    Madani, Omid
    ParandehGheibi, Ali
    Yadav, Navindra
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 48 - 48
  • [29] Research of High-Efficiency Network Security for In-Vehicle Ethernet based on FPU-RSA Encryption Algorithm
    Wang, Jing-Ting
    Xu, Yi-Hu
    Wu, Yu-Jing
    Xu, Yi-Nan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 195 - 199
  • [30] Improving Security in a Virtual Network by Using Attribute Based Encryption Algorithm
    Wilson, Vinil
    Krishnan, Ajeesh G.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,