期刊文献+
共找到641篇文章
< 1 2 33 >
每页显示 20 50 100
Application Strategy of Data Encryption Technology in Computer Network Security
1
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK SECURITY data encryption technology application STRATEGY
下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:3
2
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
下载PDF
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
3
作者 Xi Lin Yiliang Han 《国际计算机前沿大会会议论文集》 2017年第1期54-55,共2页
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access c... To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access control scheme of private data based on attribute encryption.First,we construct a new algorithm based on attribute encryption,which divides encryption into two phases,and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions.We encrypt the private data hierarchically with our algorithm to realize“precise”,“more accurate”,“fuzzy”and“private”four management modes,then users with higher permissions can access the private data inferior to their permissions.And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection.Finally,we analyze the efficiency and the security of our scheme. 展开更多
关键词 data SHARING HIERARCHICAL access control ATTRIBUTE encryption OUTSOURCING decryption
下载PDF
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
4
作者 S.Prince Chelladurai T.Rajagopalan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期951-960,共10页
Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises mo... Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises more security issues.In addition,Cloud computing is incompatible with several industries,including finance and government.Public-key cryptography is frequently cited as a significant advancement in cryptography.In contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data.This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography.Through strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced entities.Both the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure services.The suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of data.Based on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data. 展开更多
关键词 Digital Envelope Cloud computing big data encryption decryption
下载PDF
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
5
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 data Security Cloud Computing encryption decryption Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512
下载PDF
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
6
作者 Arif Sari Mehmet Karay 《International Journal of Communications, Network and System Sciences》 2015年第13期567-577,共11页
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating... There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security. 展开更多
关键词 REACTIVE SECURITY data SECURITY Mobile-Wireless Network PROACTIVE SECURITY encryption decryption CRYPTOGRAPHY
下载PDF
可撤销属性加密的区块链数据访问控制方法 被引量:4
7
作者 李健 戚湧 《计算机工程与设计》 北大核心 2024年第2期348-355,共8页
针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进... 针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进行安全性证明;基于超级账本Fabric进行系统设计,结合星际文件系统采用链上链下存储方式解决区块链容量不足和系统效率问题。实验结果表明,所提方案撤销属性时无需更新密钥密文重复上链,仅需要6次Pairing操作进行预解密和解密,且在大规模属性集下,预解密时间和解密时间平均保持在百毫秒左右的常量级上,实现区块链数据高效、细粒度的访问控制。 展开更多
关键词 区块链 数据共享 访问控制 属性基加密 预解密 属性撤销 星际文件系统
下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
8
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing data Integrity data Security SHA-1 Digital Signature AES encryption and decryption
下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
9
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 encryption decryption Non-Square Matrices Low Energy High Secured data Transmission
下载PDF
数据加密技术在计算机网络安全中的应用 被引量:1
10
作者 张洁 《信息与电脑》 2024年第10期225-227,231,共4页
在经历了互联网快速普及和几次大的互联网浪潮等重大变革后,计算机网络安全问题已经成为无法忽视的问题。网络攻击、数据泄露等风险事件频繁发生,个人隐私和企业信息都面临着前所未有的威胁。于此背景下,数据加密技术,作为保护网络安全... 在经历了互联网快速普及和几次大的互联网浪潮等重大变革后,计算机网络安全问题已经成为无法忽视的问题。网络攻击、数据泄露等风险事件频繁发生,个人隐私和企业信息都面临着前所未有的威胁。于此背景下,数据加密技术,作为保护网络安全的一把锐利武器,其重要性不言而喻。基于此,本文首先阐述数据加密技术的基本原理,其次阐述数据加密技术在计算机网络安全中的应用优势,最后提出一些数据加密技术在计算机网络安全中的应用策略,以供参考。 展开更多
关键词 数据加密技术 计算机网络安全 应用
下载PDF
网络安全中数据加密技术的运用分析
11
作者 房晓亮 尹玉振 张微 《科技资讯》 2024年第20期78-80,共3页
在当今信息化时代,计算机网络已成为社会运作和日常生活的基础设施,承载着海量数据的传输与交换。随着网络空间的不断扩展,数据安全问题日益凸显,信息泄露、篡改、盗用等安全事件频发,严重威胁个人隐私、用户机密乃至国家安全。基于此,... 在当今信息化时代,计算机网络已成为社会运作和日常生活的基础设施,承载着海量数据的传输与交换。随着网络空间的不断扩展,数据安全问题日益凸显,信息泄露、篡改、盗用等安全事件频发,严重威胁个人隐私、用户机密乃至国家安全。基于此,旨在深入探讨数据加密技术在计算机网络信息安全中的应用,分析其在保障数据完整性、机密性和可用性方面的作用,为网络安全提供更为坚实的防线。 展开更多
关键词 网络 信息安全 数据加密技术 加密密钥
下载PDF
一种干部培训电子证书的生成方法与系统
12
作者 钱哨 李挥剑 孙瑶 《现代信息科技》 2024年第11期76-80,共5页
在干部教育培训过程中,传统培训证书信息收集、制作、核对和分发效率低、出错率高、成本高。文章提出一种干部培训电子证书的生成方法与系统,通过报名系统获取学员数据,经Web API接口完成数据集成,并对已有电子证书中电子照片进行面部... 在干部教育培训过程中,传统培训证书信息收集、制作、核对和分发效率低、出错率高、成本高。文章提出一种干部培训电子证书的生成方法与系统,通过报名系统获取学员数据,经Web API接口完成数据集成,并对已有电子证书中电子照片进行面部识别算法纠错预处理;进一步对电子证书加密生成PDF文件,并发布至学员终端。证书认证为数据加密逆操作,可实现对证书真伪的校验,彻底解决了干部培训证书分类整理、核对、验证、归档等一系列技术问题。 展开更多
关键词 干部培训 电子证书 面部识别 数据加/解密 PDF 数据交换
下载PDF
计算机网络通信中的数据加密技术研究
13
作者 高海燕 《长江信息通信》 2024年第10期169-171,共3页
基于网络入侵攻击、匿名用户访问的安全防护管理需求,利用Hadoop分布式软件框架、CP-ABE(Ciphertext Policy ABE)属性基加密算法,建构起访问身份认证、密钥共享的云服务控制平台,由属性授权中心机构自主生成网络通信的公钥、主私钥,数... 基于网络入侵攻击、匿名用户访问的安全防护管理需求,利用Hadoop分布式软件框架、CP-ABE(Ciphertext Policy ABE)属性基加密算法,建构起访问身份认证、密钥共享的云服务控制平台,由属性授权中心机构自主生成网络通信的公钥、主私钥,数据所有者基于CP-ABE加密算法的双线性映射规则作出数据属性集合的密钥加密,数据接收者基于访问结构的密文、解密密钥完成数据属性集合解密操作,并在公有云服务平台形成加密数据存储和细粒度共享,有效提升计算机网络通信的数据访问、传输管理安全性。 展开更多
关键词 计算机网络通信 数据加密 访问控制 属性基加密技术
下载PDF
计算机系统中的数据加密技术分析
14
作者 郭琼 《集成电路应用》 2024年第3期286-287,共2页
阐述计算机信息数据安全分析和加密技术特点。分析计算机数据安全威胁类型,包括基础设施、数据库储存、网络安全、持续性攻击类,探讨计算机信息数据安全分析和加密技术的应用。
关键词 计算机系统 信息数据 安全分析 加密技术
下载PDF
基于区块链技术的Web服务器数据加密方法
15
作者 吴静莉 《无线互联科技》 2024年第17期109-111,共3页
为了提高Web服务器数据的安全性,文章提出了一种基于区块链技术的Web服务器数据加密方法。先进行Web服务器数据去重,以减少冗余数据,建立安全传输协议,通过智能合约、生成和分发密钥实现数据的加密传输,确保数据在传输过程中不被未经授... 为了提高Web服务器数据的安全性,文章提出了一种基于区块链技术的Web服务器数据加密方法。先进行Web服务器数据去重,以减少冗余数据,建立安全传输协议,通过智能合约、生成和分发密钥实现数据的加密传输,确保数据在传输过程中不被未经授权的第三方截获或篡改。利用区块链技术加密访问控制,保障数据的安全访问,实现数据的加密。实验结果表明,该方法的安全系数始终保持在0.98以上,证明了该加密方法的可靠性。 展开更多
关键词 区块链技术 WEB服务器 数据加密 安全传输协议
下载PDF
区块链环境下多源大数据访问加密防护仿真 被引量:1
16
作者 唐文春 栗强强 闫会峰 《计算机仿真》 2024年第5期424-428,共5页
为了提高多源大数据在网络中传输和存储的安全性,提出区块链技术下多源大数据加密防护算法。对多源大数据展开降维处理,减少数据计算量,提高算法的整体效率;结合Henon映射与Logistic映射设计一种双混沌加密算法,实现多源大数据初步加密... 为了提高多源大数据在网络中传输和存储的安全性,提出区块链技术下多源大数据加密防护算法。对多源大数据展开降维处理,减少数据计算量,提高算法的整体效率;结合Henon映射与Logistic映射设计一种双混沌加密算法,实现多源大数据初步加密;利用区块链技术设计多源大数据加密防护方案,在智能合约的基础上,大数据所有者可以将双混沌加密算法加密后的密钥上传至区块链中,同时对数据的有效访问时间展开设定,在有效访问时间内只有满足访问策略的用户才可以访问多源大数据,以此实现多源大数据的加密防护。实验结果表明,所提算法加密后的数据不容易被攻击,且具有较高的运行效率和良好的加密效果。 展开更多
关键词 数据降维 区块链技术 多源大数据 双混沌加密算法 数据加密防护
下载PDF
基于联盟区块链的高校数据平台安全共享研究 被引量:1
17
作者 白皓 刘志鹏 《现代电子技术》 北大核心 2024年第18期52-56,共5页
为打破数据孤岛,确保学校各部门之间高校数据共享时不被非法访问,提出一种基于联盟区块链的高校数据平台安全共享方法。在分析联盟区块链模式下高校数据平台共享的技术架构后,设计一种基于联盟区块链智能合约的高校数据平台安全共享机制... 为打破数据孤岛,确保学校各部门之间高校数据共享时不被非法访问,提出一种基于联盟区块链的高校数据平台安全共享方法。在分析联盟区块链模式下高校数据平台共享的技术架构后,设计一种基于联盟区块链智能合约的高校数据平台安全共享机制,此机制使用基于改进RSA加密算法的数据安全共享方法为数据发布方提供数据加密服务,为数据需求方提供数据解密服务。双方的数据共享交易主要由联盟区块链智能合约完成,智能合约按照高校数据共享的加解密信息授权结果、共享约束条件,在无第三方干预的情况下进行数据共享交易。经测试,使用所提方法进行业务数据共享时,提升了数据传输速率,且业务数据非法提取次数为0。 展开更多
关键词 联盟区块链 高校数据平台 安全共享机制 改进RSA加密算法 智能合约 数字孪生技术
下载PDF
基于混合密码技术的一种大数据加密技术研究 被引量:2
18
作者 董艳燕 《湖北师范大学学报(自然科学版)》 2024年第2期52-55,共4页
大数据背景下的数据安全比普通数据安全更加重要而且复杂,通常采用数据加密技术保证数据在存储和传输过程中的安全。介绍一种特殊的混合加密技术,对大数据背景下的数据提取某一关键字的数据域,对该数据域的数据进行加密,提高大数据背景... 大数据背景下的数据安全比普通数据安全更加重要而且复杂,通常采用数据加密技术保证数据在存储和传输过程中的安全。介绍一种特殊的混合加密技术,对大数据背景下的数据提取某一关键字的数据域,对该数据域的数据进行加密,提高大数据背景下的数据加密速度和效率。 展开更多
关键词 大数据背景 混合加密技术 有效数据 AES算法 ECC算法
下载PDF
基于可重构四值逻辑运算器构建数字文件的配置加密技术
19
作者 王宏健 韩屹晨 +1 位作者 陈迅雷 金翊 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第4期682-693,共12页
2018年问世的可重构四值逻辑运算器通配电路为配置加密技术提供了核心器件,大约在千分之1.6 mm2的微芯片上就能构造出一个32位配置加密器件的加密器、解密器和密钥派生器,在250 MB的只读存储器中就能预置1013个广义密钥源数据,每个源数... 2018年问世的可重构四值逻辑运算器通配电路为配置加密技术提供了核心器件,大约在千分之1.6 mm2的微芯片上就能构造出一个32位配置加密器件的加密器、解密器和密钥派生器,在250 MB的只读存储器中就能预置1013个广义密钥源数据,每个源数据配置出一个加密系统,因此加密系统数量很多,百年内不会重复使用.预存于配置加密器件内的广义密钥源数据结合预约码技术实现了广义密钥自动更换,免除了记忆密钥的烦恼.由于每个广义密钥只使用一次,故配置加密技术的安全性很高;加密和解密过程都使用硬件,故配置加密的工作速度很快;核心微电路体积很小,存储器也只有数百兆字节,故配置加密器件可以制作成如U盘般小巧.实验测试结果表明,配置加密技术能对常见的多种数字文件实施分组加密,理论推测其密文能抵御常见的各种攻击.因此,配置加密技术具有较好的应用前景. 展开更多
关键词 可重构四值逻辑运算器通配电路 配置加密技术 广义密钥 数据文件加/解密
下载PDF
基于BIP安全通道的iOS系统安全便捷身份认证方案
20
作者 黄世烨 黄一平 +1 位作者 梁梓辰 农丽萍 《现代电子技术》 北大核心 2024年第19期40-46,共7页
针对iOS系统应用软件与移动安全加密智能芯片间无法直接交互的问题,提出一种BIP安全通道通信方案,进而为iOS系统应用软件提供一种安全便捷的身份认证解决方案。该方案包括客户端与BIP服务器安全通信、BIP与移动安全加密智能芯片安全通... 针对iOS系统应用软件与移动安全加密智能芯片间无法直接交互的问题,提出一种BIP安全通道通信方案,进而为iOS系统应用软件提供一种安全便捷的身份认证解决方案。该方案包括客户端与BIP服务器安全通信、BIP与移动安全加密智能芯片安全通信以及客户端与移动安全加密智能芯片安全通信三个模块。方案利用移动安全加密智能芯片提供的数字签名技术为iOS客户端APP提供安全便捷的身份认证服务。通过对该方案进行安全性分析及对客户端进行性能测试,结果表明,该方案既具有安全便捷的应用效果,又具备低开销和低延迟特性。目前已应用于手机银行和信息加密领域中,具有广阔的应用前景。 展开更多
关键词 BIP通道技术 移动安全加密智能芯片 iOS系统 国密算法 身份认证 密钥协商 数字签名 客户端应用
下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部