Application Analysis of Data Encryption Technology in Computer Network Communication Security

被引:0
作者
Zhang, Xianjing [1 ]
机构
[1] Zhengzhou Univ Ind Technol, Informat Engn Inst, Xinzheng 451150, Peoples R China
来源
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018) | 2018年
关键词
data encryption technology; computer; network communications; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularization of Internet makes the application of computer network communication more and more frequently in daily life and work. As people pay more attention to the security of network communication, in order to improve the security of computer network communication, the application of data encryption technology has become an important technical means. Based on this, this paper makes an in-depth analysis on the application of data encryption technology in computer network communication security.
引用
收藏
页码:265 / 267
页数:3
相关论文
共 50 条
[21]   Research on Computer Remote Network Communication Technology Innovation [J].
Yu, Long .
2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, :1180-1183
[22]   Research on the Application of Computer Network Storage Technology [J].
Hui, Jin .
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 :240-243
[23]   Application of Computer Big Data and Convolutional Neural Network Technology in Guiding the Training Standardization [J].
Liu, Yiqiang ;
Liu, Hao ;
Zhang, Shujun ;
Liu, Chen ;
Liu, Wei .
2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, :1184-1189
[24]   Research on Application of Computer Big Data and Mobile Communication Technology in Intelligent Nursing Service Platform [J].
Zhang, Weixin ;
Ming, Yue ;
Li, Guiling .
2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, :410-414
[25]   Research on Measures for Computer Application System Security Technology Strengthening [J].
Xi, Guihua .
PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 :238-241
[26]   Improving Network, Data and Application Security for SMEs [J].
Tselios, Christos ;
Politis, Ilias ;
Xenakis, Christos .
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
[27]   Application of Computer Network Technology for Lifelong Sports Education [J].
Chen Yonghui .
ICEEM 2012: 2012 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, EDUCATION AND MANAGEMENT, VOL 1, 2012, :123-127
[28]   Application of Neural Network Model Combined with Fuzzy Theory in Computer Network Security [J].
Liu, Xiaotian .
Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 :139-143
[29]   The security and protection technology research of computer information [J].
Liu, Yu ;
Zhou, Jing .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 :90-94
[30]   Computer Network Security and Preventive Measures in the Age of Big Data [J].
Xiao, Min ;
Guo, Mei .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INTELLIGENT ROBOTICS (ICMIR-2019), 2020, 166 :438-442