期刊文献+

计算机网络信息安全中的数据加密技术研究 被引量:7

Analysis on data encryption in computer network information security
下载PDF
导出
摘要 互联网技术的发展带动了全球的发展,给人们的生活与工作带来了便捷,促进了社会的发展与进步。网络是把双刃剑,给人们带来便利的同时也带来了一些安全隐患,网络信息的恶意篡改、窃取、传播不良信息等给人们的生活也带来了一些困扰。文章主要分析了计算机网络信息安全常见的问题,介绍了计算机网络信息安全中数据加密技术,重点阐述了数据加密技术的方式,给人们提供合理化的建议。 The development of Internet technology has promoted the development of the whole world, which has brought convenience to people's life and work, and promoted the development and progress of society. Network is a double-edged sword, which brings convenience to people, and also brings some security risks. Malicious tampering, stealing and spreading bad information of network information have brought some troubles to people's life. This paper mainly analyzes the common problems of computer network information security, introduces the computer network information security data eneryption technology, focuses on the data encryption technology, to provide reasonable suggestions.
作者 王雅峰
出处 《江苏科技信息》 2017年第35期57-59,共3页 Jiangsu Science and Technology Information
关键词 网络安全 数据加密 策略 network security data encryption strategy
  • 相关文献

参考文献4

二级参考文献40

  • 1Wikipedia.Comparison of online backup services[EB/OL],(2014-01-27)[2014-01-28].http://en.wikipedia.org/wiki/Comparison of online backup services.
  • 2Dropbox Corporation.Dropbox cloud service[EB/OL],2007[2014-01-28].http://www.dropbox.com/.
  • 3Wuala Corporation.Wuala[EB/OL].2009[2014-01-28].http://www.wuala.com/.
  • 4Dutch M.Understanding data de-duplication ratios[EB/OL].(2009-02-01)[2014-01-28].http://www.snia.org/.
  • 5Harnik D,Pinkas B,Shulman-Peleg A.Side channels incloud services,the case of deduplication in cloud storage[J].IEEE Security and Privacy Magazine,2010,8(6):40-47.
  • 6Halevi S,Harnik D,et al.Proofs of ownership in remotestorage systems[C]//Proc of the 18th ACM Conf on Computer and Communications Security.New York:ACM,2011:491-500.
  • 7Mulazzani M,Schrittwieser S,et al.Dark clouds on thehorizon:Using cloud storage as attack vector and online slackspace[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:5-15.
  • 8Ryan S.Dropbox left user accounts unlocked for 4 hoursSunday[EB/OL].(2011-06-20)[2014-01-28].http://www.wired,com/threatlevel/2011/06/dropbox/.
  • 9Twitter Corporation.Tweetdeck[EB/OL].(2012-03-30)[2014-01-28].http://money,cnn.com/2012/03/30/technology/tweetdeckbug-twitter/.
  • 10Merkle C.A certified digital signature[C]//Proc onAdvances in Cryptology-CRYPTO,89.Berlin:Springer.1989:218-238.

共引文献62

同被引文献40

引证文献7

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部