期刊文献+

加密方法的应用

Application of Encryption
下载PDF
导出
摘要 在信息社会,使用网络进行重要、保密的信息传递的方式已愈来愈为人们所接受.笔者通过对网络安全的基本要求及目前网络存在威胁的阐述,对加密技术在分类、模式及密钥的管理上进行的分析,在此基础上,将加密技术应用于数据、电子邮件、图像和视频等信息,达到在网络上能够安全传递的目的。 In the information society, the use network carry out important, confidential information has been passed in this way has become increasingly accepted by all. Through to network security's essential requirements as well as the present network existence threat's elaboration, and to the encryption technology the analysis in classified, the pattern and in key's management , based on this, will encrypt the technology to apply in information and so on data, email, image and video frequency, serves purpose which could transmit safely in the network.
出处 《吉林建筑工程学院学报》 CAS 2010年第1期83-86,共4页 Journal of Jilin Architectural and Civil Engineering
关键词 加密 解密 密钥 encryption decryption key
  • 相关文献

参考文献2

二级参考文献10

  • 1Tang L.. Methods for encrypting an decrypting mpeg video data efficiently. In: Proceedings of ACM Multimedia'96, Boston United States, 1996, 219~229
  • 2Shi C.,Bhargava B.. An efficient MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, United Kingdom, 1998, 9: 381~386
  • 3Alattar A.M., Al-Regib G.I.. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceeding of ICIP, 1999, 4: 256~260
  • 4Wu Xiao-Ling, Moo Peter W.. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficient. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, 2: 908~912
  • 5Romeo, Romolotti G., Mattavelli M., Mlynek D.. Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In: Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 261~264
  • 6Silva C.P.,Young A.M.. Introduction to chaos-based communications and signal processing. IEEE Proceedings of Aerospace, 2000, 1: 279~299
  • 7Robert Matthews. On the derivation of a "chaotic" encryption algorithm.Cryptologia. 1989, 8(1):29~41
  • 8Wheeler D.D., Matthews R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, 1991, 15(2): 140~152
  • 9钟玉琢 乔秉新 祁卫.[D].北京:清华大学,1997.
  • 10Bruce.Schneier.Applied Cryptography Protocols,Algorithms, and Source Code in C. America: Wiley & Sons Inc, 1996

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部