期刊文献+

移动互联环境下数据通信安全技术的应用研究 被引量:1

Research on the application of data communication security technology in mobile Internet environment
下载PDF
导出
摘要 近年来,随着我国经济水平的不断提高,移动互联环境得到了飞速发展。在这种背景下,数据通信安全技术面临着巨大的发展机遇。因此全面研究移动互联环境下数据通信安全技术具有普遍的实用价值。文章从数据通信安全入手,全面分析了当前数据通信面临的挑战,并讨论数据通信安全技术的实施。 In recent years,with the continuous improvement of China’s economic level,the mobile interconnection environment has been rapidly developed.In this context,data communication security technology is facing great development opportunities.Therefore,the comprehensive study of data communication security technology in mobile interconnection environment has universal practical value.This paper starts with the data communication security,comprehensively analyzes the current data communication challenges,and discusses the implementation of data communication security technology.
作者 冯丽娜 Feng Lina(Shanxi Jintong Post and Telecommunications Industry Co.,Ltd.,Changzhi Communications Branch,Changzhi 046000,China)
出处 《无线互联科技》 2021年第15期1-2,共2页 Wireless Internet Technology
关键词 移动互联网 数据通信安全 技术应用 mobile Internet data communication security technology applications
  • 相关文献

参考文献3

二级参考文献11

  • 1VICTOR G M, LUIS H E, CARMEN S A. A Java implementation of the Elliptic Curve Integrated Encryption Scheme. ( 2011 ). [ EB/ OL]. http://digital, csie. es/handle/10251/33129.
  • 2SHIPSEY R. ECIES[ Z]. London , University of London ,2001.
  • 3ABDALLA M, BELLARE M, ROGAWAY P. DHIES:An Encryption Scheme Based on the Ddtirie - HeUman Problem. (1998). [ EB/OL ]. http://cseweb, ucsd. edu/uscrs/milir/papers/dhaes. pdf.
  • 4KOBLITZ N. Elliptic curve cryptosys-tems[Z]. Math. Comp, 1987, 48:203 - 209.
  • 5DIFFIE W, HELLMAN M E. New directions in cryptography. IEEE Trans. Inform. Theory, 1976, 22:644 - 654.
  • 6Failer C.Matrixm Surround Revisited:the AES 30th International Conference[C]. Saariselka, Finland, 2007.
  • 7Failer C,Schillebeekx P.Improved ITU and Matrix Surround Downmixing: the AES 130th Convention [C]. London, UK, 2011.
  • 8陈萍,夏俊杰.移动互联网安全现状及应对策略[J].电信网技术,2010(2):35-38. 被引量:11
  • 9段伟希,周智,张晨,李刚.移动互联网安全威胁分析与防护策略[J].电信工程技术与标准化,2010,23(2):7-9. 被引量:13
  • 10王明会.移动互联网技术及应用热点浅析[J].信息通信技术,2010,4(4):14-19. 被引量:24

共引文献10

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部