Application Analysis of Data Encryption Technology in Computer Network Communication Security

被引:0
作者
Zhang, Xianjing [1 ]
机构
[1] Zhengzhou Univ Ind Technol, Informat Engn Inst, Xinzheng 451150, Peoples R China
来源
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018) | 2018年
关键词
data encryption technology; computer; network communications; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularization of Internet makes the application of computer network communication more and more frequently in daily life and work. As people pay more attention to the security of network communication, in order to improve the security of computer network communication, the application of data encryption technology has become an important technical means. Based on this, this paper makes an in-depth analysis on the application of data encryption technology in computer network communication security.
引用
收藏
页码:265 / 267
页数:3
相关论文
共 50 条
[31]   Information under the network environment using computer information security technology [J].
Sun, Qing Li .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, :474-477
[32]   Analysis on the Application of Computer Technology in Plastic Art [J].
Lu, Xiaofei .
INFORMATION AND BUSINESS INTELLIGENCE, PT I, 2012, 267 :367-372
[33]   Application and analysis of computer image processing technology [J].
Su, Huiming .
MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, :30-34
[34]   Data and communication security [J].
AlHamouz, Sadeq .
WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 1, 2005, :60-64
[35]   RETRACTED: Research on the application of speech recognition in computer network technology in the era of big data (Retracted Article) [J].
Zhang, Baohua .
INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY, 2021, 26 (1) :259-259
[36]   Research on the Application of Computer Network Technology in University Archives Management [J].
Cui, Liying ;
Zhou, Haiyan ;
Li, Qun .
PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 :25-29
[37]   Main Methods and Application Areas of Multiplexing Technology in Network Communication [J].
Ren, Deqi .
ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 :393-397
[38]   Research on Computer Network Security [J].
Yin, Qinghai .
3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, :235-240
[39]   The Evaluation Analysis of Computer Network Information Security based on FAHP [J].
Wu, Qian .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09) :229-242
[40]   Analysis and Countermeasures Research on the Computer Network Security at the New Stage [J].
Wang, Qi .
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 :658-662