Application Analysis of Data Encryption Technology in Computer Network Communication Security

被引:0
作者
Zhang, Xianjing [1 ]
机构
[1] Zhengzhou Univ Ind Technol, Informat Engn Inst, Xinzheng 451150, Peoples R China
来源
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018) | 2018年
关键词
data encryption technology; computer; network communications; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The popularization of Internet makes the application of computer network communication more and more frequently in daily life and work. As people pay more attention to the security of network communication, in order to improve the security of computer network communication, the application of data encryption technology has become an important technical means. Based on this, this paper makes an in-depth analysis on the application of data encryption technology in computer network communication security.
引用
收藏
页码:265 / 267
页数:3
相关论文
共 50 条
[41]   The application research of Hyperchaos encryption in security communications [J].
Gao Bingkun ;
Li Wenchao ;
Hu Yue .
CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, :1278-1281
[42]   Research on the Application of Cloud Computing Technology in Computer Data Processing [J].
Zhang, Jun .
2021 3RD INTERNATIONAL CONFERENCE ON MACHINE LEARNING, BIG DATA AND BUSINESS INTELLIGENCE (MLBDBI 2021), 2021, :510-514
[43]   The security and protection strategy research of computer network information [J].
Liu, Yu ;
Chang, Jing .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 :95-99
[44]   Research of Computer Network Information Security and Protection Strategy [J].
Lu Zhen ;
Xiong Zhen ;
Tu Keqin .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 :2162-+
[45]   Cloud data security with hybrid symmetric encryption [J].
Kaushik, Shweta ;
Gandhi, Charu .
2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
[46]   Analysis on Application of Layering Technology in Computer Software Development [J].
Tong, Chao ;
Wang, Song .
PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 :21-25
[47]   Cloud Storage Encryption Security Analysis [J].
Zhang Jing ;
Wang Jinsu ;
Zheng Zhuangfeng ;
Zhao Chongan .
PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, :62-65
[48]   Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age [J].
Xue, Liang ;
Yang, Juan ;
Fan, Weiguo .
PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 :81-85
[49]   Analysis of wireless network security for data transmission performance [J].
Sawicki, Daniel ;
Smyk, Sebastian .
PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2019, 2019, 11176
[50]   Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks [J].
Youn, Seongwook ;
Cho, Hyun-chong .
JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2017, 12 (03) :1307-1313