期刊文献+

数据加密技术在计算机网络安全中的应用 被引量:2

Application of Data Encryption Technology in Computer Network Security
下载PDF
导出
摘要 随着信息技术的日益提升,计算网络安全问题就显得越来越突出。非法入侵、信息泄露、病毒影响、网络漏洞都是影响计算机网络安全的要素。为了能够有效的保障数据信息的完整性和保密性,人们必须针对计算机网络安全引起充分重视。 With the rising of the information technology,network security problem becomes more and more prominent.The illegal invasion,information disclosure,virus effect,network vulnerabilities are all factors affecting the safety of computer network.In order to effectively ensure the data integrity and confidentiality of information,people must cause enough attention for computer network security.
作者 许伟雄 XU Wei-xiong(Zhangzhou city college,Fujian zhangzhou 363000)
出处 《普洱学院学报》 2017年第3期45-48,共4页 Journal of Pu'er University
关键词 数据加密 计算机网络 网络安全 应用价值 应对举措 data encryption Computer network Network security Application value response
  • 相关文献

参考文献4

二级参考文献41

  • 1RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[A]. DeMillo RA Foundations of Secure Computation[C]. NY, USA: Academic Press, 1978.169-180.
  • 2PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A]. Proc of the Advances in Cryptology (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 3GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
  • 4RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications oft.he ACM, 1978, 2l(2): 120-126.
  • 5ELGAMAL T. A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
  • 6BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[A]. Second Theory of Cryptography Conference (TTC 2005)[C]. Cambridge, MA, USA, 2005.325-341.
  • 7GENTRY C. A Fully Homomorphic Encryption Scheme[D]. Califor- nia, USA: Stanford University, 2009.
  • 8GENTRY C. Fully homomorphic encryption using ideal lattices[A]. Proc of the 41st ACM Symposium on Theory of Computing(STOC' 09)[C]. Bethesda, Maryland, USA, 2009.169-178.
  • 9SMART P N, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proc of the Public Key Cryptography (PKC 2010)[C]. Paris, France, 2010.420-443.
  • 10DIJK V M, GENTRY C, HALEVI S, et al. Fully homomorphic en- cryption over the integers[A]. Proc of the Advances in Cryptology (EUROCRYPT 2010)[C]. Riviera, France, 2010.24-43.

共引文献85

同被引文献15

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部