期刊文献+
共找到735篇文章
< 1 2 37 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 data encryption data decryption Communication security data storage encryption Key management
在线阅读 下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
2
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK SECURITY data encryption technology application STRATEGY
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
3
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
4
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:4
5
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
在线阅读 下载PDF
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
6
作者 Xi Lin Yiliang Han 《国际计算机前沿大会会议论文集》 2017年第1期54-55,共2页
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access c... To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access control scheme of private data based on attribute encryption.First,we construct a new algorithm based on attribute encryption,which divides encryption into two phases,and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions.We encrypt the private data hierarchically with our algorithm to realize“precise”,“more accurate”,“fuzzy”and“private”four management modes,then users with higher permissions can access the private data inferior to their permissions.And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection.Finally,we analyze the efficiency and the security of our scheme. 展开更多
关键词 data SHARING HIERARCHICAL access control ATTRIBUTE encryption OUTSOURCING decryption
在线阅读 下载PDF
网络安全中的数据加密与解密技术研究
7
作者 林明亮 《移动信息》 2026年第1期122-124,共3页
随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期... 随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期管理机制以及传输层加密与协议优化相关内容。研究表明,当前网络安全的数据加密与解密技术已构建多层次技术体系,为网络通信的数据安全提供了可靠保障。 展开更多
关键词 网络安全 数据加密 解密技术 解密算法原理
在线阅读 下载PDF
基于UltraScale架构的数据加密方法研究
8
作者 唐李杨 《电子技术应用》 2026年第1期38-42,共5页
针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信... 针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信息校验格式,采用离线加密和在线解密的方式完成设备加解密功能。实验结果表明,提出的设计方法有效可行,设备加解密功能正常,提高了设备的安全性,有效保护了用户知识产权。目前,该技术已在航空通信多型设备中得到应用,具有较强的实用性。 展开更多
关键词 UltraScale架构 数据加密 DNA获取 密钥存储 加解密算法
在线阅读 下载PDF
建筑企业主数据管理平台设计与应用
9
作者 王壮 周文利 +4 位作者 李晨浩 韩光冲 张文 于佳 谢军 《科技创新与应用》 2026年第3期114-117,共4页
针对跨信息系统间核心数据不一致、业务协同难、运维成本高等问题,开发一种基于面向服务架构(SOA)主数据管理平台,结合建筑企业信息化需求,提出信息系统间主数据交互方案。应用基于Three.js框架的工作流技术,建立多部门协同处理的主数... 针对跨信息系统间核心数据不一致、业务协同难、运维成本高等问题,开发一种基于面向服务架构(SOA)主数据管理平台,结合建筑企业信息化需求,提出信息系统间主数据交互方案。应用基于Three.js框架的工作流技术,建立多部门协同处理的主数据审批机制。为加强数据传输安全性,采用加密技术和基于数字签名的访问控制技术。应用结果表明,主数据管理平台可实现跨系统间核心数据交互与共享,确保数据的准确性和一致性,提高数据资源复用效率。 展开更多
关键词 主数据 面向服务架构 工作流 数字签名 加密技术
在线阅读 下载PDF
电子信息系统中的数据隐私保护与加密技术研究
10
作者 杨洪金 《计算机应用文摘》 2026年第2期241-242,245,共3页
文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能... 文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能的影响程度较低,能够有效应对电子信息系统中潜在的数据泄露风险。 展开更多
关键词 电子信息系统 数据隐私 加密技术 信息安全 访问控制
在线阅读 下载PDF
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
11
作者 S.Prince Chelladurai T.Rajagopalan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期951-960,共10页
Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises mo... Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises more security issues.In addition,Cloud computing is incompatible with several industries,including finance and government.Public-key cryptography is frequently cited as a significant advancement in cryptography.In contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data.This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography.Through strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced entities.Both the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure services.The suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of data.Based on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data. 展开更多
关键词 Digital Envelope Cloud computing big data encryption decryption
在线阅读 下载PDF
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
12
作者 Arif Sari Mehmet Karay 《International Journal of Communications, Network and System Sciences》 2015年第13期567-577,共11页
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating... There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security. 展开更多
关键词 REACTIVE SECURITY data SECURITY Mobile-Wireless Network PROACTIVE SECURITY encryption decryption CRYPTOGRAPHY
暂未订购
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
13
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 data Security Cloud Computing encryption decryption Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512
在线阅读 下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
14
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing data Integrity data Security SHA-1 Digital Signature AES encryption and decryption
在线阅读 下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
15
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 encryption decryption Non-Square Matrices Low Energy High Secured data Transmission
在线阅读 下载PDF
计算机网络安全防护中数据加密技术的应用 被引量:1
16
作者 田凌燕 《软件》 2025年第2期150-152,共3页
安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、... 安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、性能评估分析等多个角度探讨了在计算机网络安全防护中使用数据加密技术的关键要点。希望可以为相关人士提供帮助和借鉴,深化数据加密技术的实践应用。 展开更多
关键词 计算机 网络安全 防护 数据加密技术 应用
在线阅读 下载PDF
智能轨道交通数据安全防护体系:挑战、技术与未来演进
17
作者 陈磊 杨玉欣 公备 《都市快轨交通》 北大核心 2025年第5期8-14,共7页
为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点... 为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点;然后探讨针对网络攻击、数据泄露等威胁的联邦学习、轻量级加密、动态访问控制等前沿防护技术在资源受限环境下的应用现状、适用条件与性能表现;最后提出人工智能赋能的主动防御、跨系统协同治理等智能轨道交通数据安全未来的重点研究方向。研究结果表明:联邦学习可有效解决数据孤岛问题,在保证隐私前提下提升模型训练效率;轻量级加密算法在轨旁设备中展现出毫秒级响应优势,具有显著的应用潜力,是未来的发展趋势。研究成果可以为构建高效、可靠的智能轨道交通数据安全防护体系提供理论支撑和实践指导。 展开更多
关键词 轨道交通 数据安全 网络安全 隐私保护 加密技术
在线阅读 下载PDF
基于区块链技术的车联网隐私数据安全加密方法 被引量:1
18
作者 魏晓宁 《智能物联技术》 2025年第3期50-53,共4页
为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制... 为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制,进行车联网隐私数据批量验证;设计区块链数据结构,采用加法同态加密对数据进行分类保护,保障隐私数据块结构安全。对比实验结果表明,设计的方法不仅可以加密隐私数据,还能有效抵御外部攻击。 展开更多
关键词 区块链技术 身份验证 安全加密方法 批量验证 隐私数据 车联网
在线阅读 下载PDF
基于ZYNQ的图像采集加密传输系统设计与实现
19
作者 于波 刘双进 +1 位作者 张海涛 李庆松 《化工自动化及仪表》 2025年第5期744-753,共10页
为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加... 为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加速加密,加密图像数据经PS端以太网传至上位机,由上位机软件接收解密。实验证明该系统可以完成图像实时采集与加密传输以及解密任务,提升了图像采集传输的实时性和安全性,具有实用价值与良好前景。 展开更多
关键词 数据安全 ZYNQ SM4 QT 图像 加密 解密
在线阅读 下载PDF
人工智能技术在计算机通信数据加密中的应用
20
作者 乔亚丽 《通信电源技术》 2025年第17期192-194,共3页
基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景... 基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景下的部署架构与运行流程。人工智能技术的应用在加密处理效率、安全性和资源调度优化方面相较传统方案取得了显著提升,特别在高并发和复杂通信环境中展现出更强的适应性和实际部署潜力。 展开更多
关键词 计算机通信 数据加密 智能密钥管理 解密调度 性能优化
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部