Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on Information Encryption Technology Applied in Computer Network Security

Download as PDF

DOI: 10.23977/jwsa.2021.030103 | Downloads: 5 | Views: 309

Author(s)

Yi Shen 1, Haoming Yan 2

Affiliation(s)

1 Department of Computer Science, San Francisco State University, San Francisco, Ca 94132, , USA
2 Aerospace Engineering, University of Arizona, Tucson, Az 85719, USA

Corresponding Author

Yi Shen

ABSTRACT

In recent years, people pay more and more attention to the security of computer network. According to the practical work experience, this paper briefly analyzes the application of information encryption technology in computer network security. The first part briefly introduces the related concepts of information encryption technology, and the second part is the research on the application of information encryption technology in computer network security, Finally, the application of information encryption technology is analyzed.

KEYWORDS

Computer network security, Information encryption technology, Application, Research

CITE THIS PAPER

Yi Shen, Haoming Yan. Research on Information Encryption Technology Applied in Computer Network Security. Journal of Web Systems and Applications (2021) 3: 13-16. DOI: http://dx.doi.org/10.23977/jwsa.2021.030103.

REFERENCES

[1] Formal analysis of TPM2.0 key management APIs[J]. Qianying Zhang,Shijun Zhao,Yu Qin,Dengguo Feng.  Chinese Science Bulletin. 2019(32)
[2] A Message Digest Disposing Algorithm Based on RC4[J]. LIU Yabin, CHEN Jing, DU Ruiying, ZHANG Huanguo School of Computer, Wuhan University, Wuhan 430072, Hubei, China.  Wuhan University Journal of Natural Sciences. 2019(03)
[3] Algebra model and security analysis for cryptographic protocols[J]. HUAI Jinpeng & LI Xianxian School of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China Correspondence should be addressed to Huai Jinpeng (email: [email protected]).  Science in China(Series F:Information Sciences). 2019(02)
[4] Trusted Next Generation Internetand Its Development[J]. Wu Jianping, Bi Jun (Network Research Center of Tsinghua University, Beijing 100084, China).  ZTE Communications. 2018(01)
[5] BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks. Fu-Hau Hsu,Chang-Kuo Tso,Yi-Chun Yeh,Wei-Jen Wang,Li-Han Chen. IEEE Journal on Selected Areas in Communications. 2019

Downloads: 227
Visits: 29888

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.