期刊文献+
共找到729篇文章
< 1 2 37 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 data encryption data decryption Communication security data storage encryption Key management
在线阅读 下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
2
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK SECURITY data encryption technology application STRATEGY
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
3
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
4
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:4
5
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
在线阅读 下载PDF
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
6
作者 Xi Lin Yiliang Han 《国际计算机前沿大会会议论文集》 2017年第1期54-55,共2页
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access c... To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access control scheme of private data based on attribute encryption.First,we construct a new algorithm based on attribute encryption,which divides encryption into two phases,and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions.We encrypt the private data hierarchically with our algorithm to realize“precise”,“more accurate”,“fuzzy”and“private”four management modes,then users with higher permissions can access the private data inferior to their permissions.And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection.Finally,we analyze the efficiency and the security of our scheme. 展开更多
关键词 data SHARING HIERARCHICAL access control ATTRIBUTE encryption OUTSOURCING decryption
在线阅读 下载PDF
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
7
作者 S.Prince Chelladurai T.Rajagopalan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期951-960,共10页
Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises mo... Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises more security issues.In addition,Cloud computing is incompatible with several industries,including finance and government.Public-key cryptography is frequently cited as a significant advancement in cryptography.In contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data.This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography.Through strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced entities.Both the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure services.The suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of data.Based on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data. 展开更多
关键词 Digital Envelope Cloud computing big data encryption decryption
在线阅读 下载PDF
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
8
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 data Security Cloud Computing encryption decryption Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512
在线阅读 下载PDF
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
9
作者 Arif Sari Mehmet Karay 《International Journal of Communications, Network and System Sciences》 2015年第13期567-577,共11页
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating... There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security. 展开更多
关键词 REACTIVE SECURITY data SECURITY Mobile-Wireless Network PROACTIVE SECURITY encryption decryption CRYPTOGRAPHY
暂未订购
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
10
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing data Integrity data Security SHA-1 Digital Signature AES encryption and decryption
在线阅读 下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
11
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 encryption decryption Non-Square Matrices Low Energy High Secured data Transmission
在线阅读 下载PDF
计算机网络安全防护中数据加密技术的应用 被引量:1
12
作者 田凌燕 《软件》 2025年第2期150-152,共3页
安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、... 安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、性能评估分析等多个角度探讨了在计算机网络安全防护中使用数据加密技术的关键要点。希望可以为相关人士提供帮助和借鉴,深化数据加密技术的实践应用。 展开更多
关键词 计算机 网络安全 防护 数据加密技术 应用
在线阅读 下载PDF
智能轨道交通数据安全防护体系:挑战、技术与未来演进
13
作者 陈磊 杨玉欣 公备 《都市快轨交通》 北大核心 2025年第5期8-14,共7页
为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点... 为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点;然后探讨针对网络攻击、数据泄露等威胁的联邦学习、轻量级加密、动态访问控制等前沿防护技术在资源受限环境下的应用现状、适用条件与性能表现;最后提出人工智能赋能的主动防御、跨系统协同治理等智能轨道交通数据安全未来的重点研究方向。研究结果表明:联邦学习可有效解决数据孤岛问题,在保证隐私前提下提升模型训练效率;轻量级加密算法在轨旁设备中展现出毫秒级响应优势,具有显著的应用潜力,是未来的发展趋势。研究成果可以为构建高效、可靠的智能轨道交通数据安全防护体系提供理论支撑和实践指导。 展开更多
关键词 轨道交通 数据安全 网络安全 隐私保护 加密技术
在线阅读 下载PDF
基于ZYNQ的图像采集加密传输系统设计与实现
14
作者 于波 刘双进 +1 位作者 张海涛 李庆松 《化工自动化及仪表》 2025年第5期744-753,共10页
为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加... 为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加速加密,加密图像数据经PS端以太网传至上位机,由上位机软件接收解密。实验证明该系统可以完成图像实时采集与加密传输以及解密任务,提升了图像采集传输的实时性和安全性,具有实用价值与良好前景。 展开更多
关键词 数据安全 ZYNQ SM4 QT 图像 加密 解密
在线阅读 下载PDF
人工智能技术在计算机通信数据加密中的应用
15
作者 乔亚丽 《通信电源技术》 2025年第17期192-194,共3页
基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景... 基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景下的部署架构与运行流程。人工智能技术的应用在加密处理效率、安全性和资源调度优化方面相较传统方案取得了显著提升,特别在高并发和复杂通信环境中展现出更强的适应性和实际部署潜力。 展开更多
关键词 计算机通信 数据加密 智能密钥管理 解密调度 性能优化
在线阅读 下载PDF
车辆社交网络中可撤销的数据共享方案
16
作者 许艳 潘雨桐 +1 位作者 张经纬 施俊 《西安邮电大学学报》 2025年第4期97-105,共9页
为了降低车辆社交网络(Vehicular Social Networks,VSNs)中数据共享方案的通信和计算开销,实现车辆间的实时通信,提出一个轻量级可撤销的VSNs数据共享方案(Revocable Data Sharing Scheme,RDSS)。该方案通过基于属性加密的与门访问结构... 为了降低车辆社交网络(Vehicular Social Networks,VSNs)中数据共享方案的通信和计算开销,实现车辆间的实时通信,提出一个轻量级可撤销的VSNs数据共享方案(Revocable Data Sharing Scheme,RDSS)。该方案通过基于属性加密的与门访问结构,使得密文及密钥长度固定,从而减少用户的计算开销,实现轻量级且细粒度的数据共享。此外,当有用户被撤销时,通过将撤销列表嵌入密文,使得未撤销的用户无需更新密钥仍可有效地访问数据,减小用户的计算开销。安全性分析结果表明,在判定性双线性Diffie-Hellman困难假设下RDSS能够抵抗选择明文攻击。性能分析结果表明,即使属性数量增加,RDSS仍保持常数级的计算开销和通信开销,更适用于VSNs中资源受限的车辆终端。 展开更多
关键词 数据共享 基于属性加密 撤销机制 可验证外包解密 隐私保护
在线阅读 下载PDF
基于区块链技术的车联网隐私数据安全加密方法
17
作者 魏晓宁 《智能物联技术》 2025年第3期50-53,共4页
为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制... 为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制,进行车联网隐私数据批量验证;设计区块链数据结构,采用加法同态加密对数据进行分类保护,保障隐私数据块结构安全。对比实验结果表明,设计的方法不仅可以加密隐私数据,还能有效抵御外部攻击。 展开更多
关键词 区块链技术 身份验证 安全加密方法 批量验证 隐私数据 车联网
在线阅读 下载PDF
基于区块链技术的智能油田信息安全防护建模 被引量:1
18
作者 王利君 段非 +1 位作者 王白羽 王婷 《兵工自动化》 北大核心 2025年第6期43-47,73,共6页
为保障智能油田信息的安全性,提出基于区块链技术的智能油田信息安全防护方法。对智能油田信息实施合理聚类后,构建不同种类智能油田信息数据集,使用基于主动学习的数据清洗技术,清洗各智能油田信息数据集;使用基于区块链与人工智能技... 为保障智能油田信息的安全性,提出基于区块链技术的智能油田信息安全防护方法。对智能油田信息实施合理聚类后,构建不同种类智能油田信息数据集,使用基于主动学习的数据清洗技术,清洗各智能油田信息数据集;使用基于区块链与人工智能技术的数据加密传输方法,加密传输智能油田信息,并将其放入区块链实施分布式存储;信息访问者需获得认证凭证,方能合理访问智能油田信息。结果表明:将该方法应用于智能油田信息安全防护工作中,可显著提升智能油田信息的安全性,使其避免遭受网络攻击与非法访问。 展开更多
关键词 区块链技术 智能油田信息 安全防护 数据清洗 数据加密 加密传输
在线阅读 下载PDF
数据加密技术在计算机网络安全中的应用研究 被引量:9
19
作者 宋彦京 《数字通信世界》 2025年第1期124-126,共3页
在信息化环境中,计算机网络已然发展成为大众生活工作中必不可少的一种工具。然而,在网络功能越来越丰富的同时,网络安全问题也日益突出。病毒入侵、黑客攻击都会威胁到用户的人身和财产安全,为此,引入数据加密技术十分必要。在数据加... 在信息化环境中,计算机网络已然发展成为大众生活工作中必不可少的一种工具。然而,在网络功能越来越丰富的同时,网络安全问题也日益突出。病毒入侵、黑客攻击都会威胁到用户的人身和财产安全,为此,引入数据加密技术十分必要。在数据加密技术的辅助下,计算机网络可充分满足用户的需求,有效规避数据安全风险,并加强网络系统的安全性能。基于这一背景,本文介绍了数据加密技术,着重探究其在计算机网络安全中的应用意义与策略要点。 展开更多
关键词 计算机网络 网络安全 数据加密 技术应用
在线阅读 下载PDF
混合数据加密技术在计算机网络信息安全中的应用 被引量:4
20
作者 张济鸿 谭龙广 傅东波 《信息与电脑》 2025年第11期97-99,共3页
计算机网络是现代社会信息交流的平台,但随之而来的是计算机网络信息安全问题。用户数据被泄露、企业数据库被黑客频繁攻击,给个人、企业和国家带来了巨大损失。通常采用混合数据加密技术以保障计算机网络信息的安全性。文章对混合数据... 计算机网络是现代社会信息交流的平台,但随之而来的是计算机网络信息安全问题。用户数据被泄露、企业数据库被黑客频繁攻击,给个人、企业和国家带来了巨大损失。通常采用混合数据加密技术以保障计算机网络信息的安全性。文章对混合数据加密技术的基本原理进行了剖析,结合混合数据加密技术的特点,表明混合数据加密技术具有高效性、安全性和灵活性等优势。文章重点探讨了混合数据加密技术在数据传输安全、数据存储安全,以及身份认证与数字签名等计算机网络信息安全场景中的应用,旨在全方位提升计算机网络信息的安全防护水平。 展开更多
关键词 混合数据加密技术 计算机网络信息安全 数据传输 数据存储
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部