Research on Information Encryption Technology Applied in Computer Network Security
DOI: 10.23977/jwsa.2021.030103 | Downloads: 16 | Views: 1405
Author(s)
Yi Shen 1, Haoming Yan 2
Affiliation(s)
1 Department of Computer Science, San Francisco State University, San Francisco, Ca 94132, , USA
2 Aerospace Engineering, University of Arizona, Tucson, Az 85719, USA
Corresponding Author
Yi ShenABSTRACT
In recent years, people pay more and more attention to the security of computer network. According to the practical work experience, this paper briefly analyzes the application of information encryption technology in computer network security. The first part briefly introduces the related concepts of information encryption technology, and the second part is the research on the application of information encryption technology in computer network security, Finally, the application of information encryption technology is analyzed.
KEYWORDS
Computer network security, Information encryption technology, Application, ResearchCITE THIS PAPER
Yi Shen, Haoming Yan. Research on Information Encryption Technology Applied in Computer Network Security. Journal of Web Systems and Applications (2021) 3: 13-16. DOI: http://dx.doi.org/10.23977/jwsa.2021.030103.
REFERENCES
[1] Formal analysis of TPM2.0 key management APIs[J]. Qianying Zhang,Shijun Zhao,Yu Qin,Dengguo Feng. Chinese Science Bulletin. 2019(32)
[2] A Message Digest Disposing Algorithm Based on RC4[J]. LIU Yabin, CHEN Jing, DU Ruiying, ZHANG Huanguo School of Computer, Wuhan University, Wuhan 430072, Hubei, China. Wuhan University Journal of Natural Sciences. 2019(03)
[3] Algebra model and security analysis for cryptographic protocols[J]. HUAI Jinpeng & LI Xianxian School of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China Correspondence should be addressed to Huai Jinpeng (email: [email protected]). Science in China(Series F:Information Sciences). 2019(02)
[4] Trusted Next Generation Internetand Its Development[J]. Wu Jianping, Bi Jun (Network Research Center of Tsinghua University, Beijing 100084, China). ZTE Communications. 2018(01)
[5] BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks. Fu-Hau Hsu,Chang-Kuo Tso,Yi-Chun Yeh,Wei-Jen Wang,Li-Han Chen. IEEE Journal on Selected Areas in Communications. 2019
Downloads: | 1153 |
---|---|
Visits: | 53168 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks