期刊文献+

数据加密技术在计算机网络通信安全中的应用研究 被引量:1

Research on Application of Data Encryption Technology in Computer Network Communication Security
下载PDF
导出
摘要 当前计算机网络的应用领域越来越广泛,其对人们生活以及工作产生的影响也越来越大,为有效保障计算机网络通信安全,需要从相应数据加密技术的科学化运用方面加强重视。数据加密技术的类型多样,在选择相应的技术时只有和计算机网络通信安全紧密结合起来,才能真正有助于提升计算机网络的整体安全。从理论层面就计算机网络通信安全的问题和数据加密技术的应用价值加以阐述,并详细探究数据加密技术的类型以及在计算机网络通信安全中的应用,希望能通过数据加密技术的应用研究为技术的应用实践起到积极作用。 At present,the application field of computer network is becoming more and more extensive,and its impact on people’s life and work is also increasing.In order to effectively ensure the security of computer network communication,it is necessary to pay more attention to the scientific application of corresponding data encryption technology.There are many types of data encryption technology.When selecting the corresponding technology,only when it is closely integrated with the computer network communication security,can it really help to improve the overall security of the computer network.This article elaborates on the problems of computer network communication security and the application value of data encryption technology from a theoretical level,and explores the types of data encryption technology and its application in computer network communication security in detail.It is hoped that the application of data encryption technology can be used as a technology application.Practice plays a positive role.
作者 汤勇涛 TANG Yongtao(Xi'an Branch of Shaanxi Broadcasting Network Media Group Co.,Ltd.,Xi'an 710000,China)
出处 《通信电源技术》 2021年第18期171-173,共3页 Telecom Power Technology
关键词 计算机网络 数据加密技术 通信安全 computer network data encryption technology communication security
  • 相关文献

参考文献10

二级参考文献64

  • 1朱菲.虚拟专用网络技术在计算机网络信息安全中的运用策略[J].计算机产品与流通,2019,0(12):37-37. 被引量:9
  • 2徐景,胡宏林,周婷.3GPP LTE标准化进展[J].中兴通讯技术,2007,13(2):9-12. 被引量:13
  • 3国家密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].(2006-04-20)[2011-05-30].ht-tp://www.oscca.gov.cn/Doc/6/News_1106.htm.
  • 43GPP TS 35.201 Version 5.0.0. Specification of 3GPP confidentiality and integrity algorithm, Document 1:f8 and f9 Specification(Release 5),2002.
  • 53GPP TS 33.105 Version 3.8.0. 3G Seeurity Cryptographie Algorithm Requirements, 2001.
  • 6American NIST FIPS PUB 140-2. Security Requirements for Cryptographic Modules.
  • 7P Refregier,B Javidi.Optical image encryption based on input and Fourier plane random encoding[J].Optics Letters,1995,20(7):767-769.
  • 8B Javidi.Securing information by use of digital holography[J].Optics Letters,2000,25(1):28-30.
  • 9O Matoba,B Javidi.Encrypted optical memory system using three-dimensional keys in the Fresnel domain[J].Optics Letters,1999,24(11):762-764.
  • 10X Peng,Z Y Cui,T Tan.Information encryption with virtual-optics imaging system [J].Optics Communications,2002,212(4-6):235-245.

共引文献308

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部