Research on Various Algorithms in Asynchronous Network Communication System

被引:0
|
作者
Liu Yong [1 ]
Wu Jianhua [1 ]
机构
[1] Changsha Univ Sci & Technol, Changsha, Hunan, Peoples R China
来源
RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-4 | 2013年 / 734-737卷
关键词
asynchronous system; encryption; communication security; VIDEO;
D O I
10.4028/www.scientific.net/AMR.734-737.3180
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper discusses an in-depth analysis of various encryption technologies, such as RSA, DES, SHA-1, improves DES algorithm and combines their advantages, then put forward a new communication security model based on various algorithms. Thus increasing the security of asynchronous network communication system.
引用
收藏
页码:3180 / 3185
页数:6
相关论文
共 50 条
  • [31] A PROTOCOL FOR ESTABLISHING SECURE COMMUNICATION CHANNELS IN A LARGE NETWORK
    HARN, L
    HUANG, D
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1994, 6 (01) : 188 - 191
  • [32] Encrypted IP video communication system
    Apetrechioaie, Bogdan
    Mateescu, Luminita
    ADVANCED TOPICS IN OPTOELECTRONICS, MICROELECTRONICS, AND NANOTECHNOLOGIES V, 2010, 7821
  • [33] Cryptanalysis of a chaotic secure communication system
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    PHYSICS LETTERS A, 2003, 306 (04) : 200 - 205
  • [34] Research on Multimedia Technology and Applications in Network
    Zhang, Ning
    Bao, Hong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 723 - +
  • [35] Research on Network Security in Electronic Commerce
    Gu Yue-sheng
    Li Yan-cui
    Chen Xiao-jing
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 175 - 178
  • [36] Research on Multimedia Data Stream in Network
    Wang Xin-gong
    2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, : 498 - 502
  • [37] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [38] A Performance based Comparison of Various Symmetric Cryptographic Algorithms in Run-time Scenario
    Kumar, Praveen
    Rawat, Seema
    Choudhury, Tanupriya
    Pradhan, Saurabh
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 37 - 41
  • [39] LARGE-SCALE RESEARCH ON QUALITY OF EXPERIENCE (QoE) ALGORITHMS
    Leszczuk, Mikolaj
    Szczerba, Blazej
    Glowacz, Andrzej
    Derkacz, Jan
    Dziech, Andrzej
    Romaniak, Piotr
    COMPUTER SCIENCE-AGH, 2013, 14 (01): : 63 - 75
  • [40] Between the Frames - Evaluation of Various Motion Interpolation Algorithms to Improve 360° Video Quality
    Fremerey, Stephan
    Hofmeyer, Frank
    Goering, Steve
    Keller, Dominik
    Raake, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2020), 2020, : 65 - 72