期刊文献+

数据加密技术在计算机网络通信安全中的应用 被引量:8

The Application of Data Encryption Technology in Computer Network Communication Security
下载PDF
导出
摘要 随着科技的发展,计算机网络通信日益发达,但是其通信安全问题也层出不穷,给社会带来了极为恶劣的影响。数据加密技术在这种局面下应运而生。本文首先对数据加密技术进行了介绍,然后阐述了几种常见的数据加密技术,最后,分析了数据加密技术在计算机网络通信安全中的应用。 With the development of science and technology, computer network communication is becoming more and more developed, but the communication security problems are also emerging, which have brought about very bad impact on society. Data encryption technology emerges in this situation. This paper firstly introduces the data encryption technology, and then expounds several common data encryption technology, and finally analyzes its application in computer network communication security.
作者 李方军
出处 《电脑与电信》 2017年第5期59-61,共3页 Computer & Telecommunication
关键词 数据加密技术 网络通信 网络安全 data encryption technology network communication network security
  • 相关文献

参考文献5

二级参考文献21

  • 1王津涛,覃尚毅,王冬梅.基于MD5的迭代冗余加密算法[J].计算机工程与设计,2007,28(1):41-42. 被引量:16
  • 2蒋波.一种基于三重DES和RSA的综合加密方案[J].微计算机信息,2007(18):52-53. 被引量:17
  • 3吴祥兴 陈忠 等.混沌学导论[M].上海:上海科学技术文献出版社,2001.57-83.
  • 4孙全尚,孙书双.浅谈数据加密技术[J].电脑学习,2007(6):52-53. 被引量:2
  • 5Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices [ J ]. International Journal of Engineering Research and Applications, 2012, 2 ( 5 ) : 914 -917.
  • 6SAPONARA S, SOLANAS A, AVOINE G, et al. Priva- cy and security in wireless sensor networks : protocols, al- gorithms, and efficient archi!ectures [ J ]. Journal of Com- puter Networks and Communications, 2013 ( 2013 ) : 1-3.
  • 7RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network [ J ]. International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691.
  • 8DANIEL D W, ROBERT A J M. Supercomputer inves- tigation of a chaotic encryption algorithm [ J]. Cryptolo- gia, 1991, 15(2):140-152.
  • 9ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VE- BEK: virtual energy-based encryption and keying for wireless sensor networks [ J ]. IEEE Transactions on Mo- bile Computing, 2010, 9(7) :994-1007.
  • 10VIDAL G, BAPTISTA M S, MANCINI H. Fundamen- tals of a classical chaos-based cryptosystem with some quantum cryptography features [ J ]. International Journal of Bifurcation and Chaos, 2012, 22 (10) : 1250243. 1- 1250243.14.

共引文献31

同被引文献24

引证文献8

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部