Education, Science, Technology, Innovation and Life
Open Access
Sign In

Exploring the Application of Data Encryption Technology in Computer Network Security

Download as PDF

DOI: 10.23977/infkm.2022.030201 | Downloads: 21 | Views: 665


Junling Li 1


1 Jining Normal University, Ulanqab, Inner Mongolia, China

Corresponding Author

Junling Li


This paper starts from the current situation of computing network security, introduces the types of data encryption technology and algorithms, explores in depth the application of data encryption technology in computer network security, and strengthens its role in the maintenance of network information security, in order to provide a good network environment for users.


Data Encryption Technology, Computer, Network Security


Junling Li, Exploring the Application of Data Encryption Technology in Computer Network Security. Information and Knowledge Management (2022) Vol. 3: 1-5. DOI:


[1] Aghili Seyed Farhad, Sedaghat Mahdi, Singelée Dave et al. MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme [J]. Future Generation Computer Systems, 2022, 131. 
[2] Xiang Xinyin, Zhao Xingwen. Blockchain-assisted searchable attribute-based encryption for e-health systems [J].  Journal of Systems Architecture, 2022(124-):124..
[3] Huang Fengming, Waqas Muhammad, Tu Shanshan et al. A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing [J]. Computer Networks, 2020, 46(5):7.
[4] Patil S ,  Patil S S ,  Solunke B R . Literature review on Efficient and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems[J].  2015(4).
[5] Nagulmeera S ,  Imran M . Protect Revocable Data Access Control for Multi-Authority Cloud Storage.  2015.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.