期刊文献+
共找到618篇文章
< 1 2 31 >
每页显示 20 50 100
Application Strategy of Data Encryption Technology in Computer Network Security
1
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER network security data encryption technology application STRATEGY
在线阅读 下载PDF
Application of Data Encryption Technology in Computer Network Communication Security
2
作者 LIUBoting JIANGYu 《外文科技期刊数据库(文摘版)自然科学》 2022年第7期010-014,共5页
When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current ... When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained. 展开更多
关键词 data encryption COMPUTER network communication security application
原文传递
Network Security in Remote Supervisory Control
3
作者 Huang Zhenguo(黄振国) 《Journal of Donghua University(English Edition)》 EI CAS 2001年第1期120-122,共3页
After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end pro... After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems. 展开更多
关键词 REMOTE supervisory control network security frontend PROCESSOR ( FEP ) data encryption standard ( DES ) authentication.
在线阅读 下载PDF
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
4
作者 Arif Sari Mehmet Karay 《International Journal of Communications, Network and System Sciences》 2015年第13期567-577,共11页
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating... There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security. 展开更多
关键词 REACTIVE security data security Mobile-Wireless network PROACTIVE security encryption DECRYPTION CRYPTOGRAPHY
暂未订购
Key-insulated encryption based group key management for wireless sensor network 被引量:2
5
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks
6
作者 Keyur Parmar Devesh C. Jinwala 《Journal of Information Security》 2015年第1期38-50,共13页
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy ef... In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route aggregation. However, the use of inherently malleable privacy homomorphism makes these protocols vulnerable to active attackers. In this paper, we propose an integrity and privacy preserving end-to-end secure data aggregation protocol. We use symmetric key-based homomorphic primitives to provide end-to-end privacy and end-to-end integrity of reverse multicast traffic. As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network’s lifetime. We comparatively evaluate the performance of the proposed protocol to show its efficacy and efficiency in resource-constrained environments. 展开更多
关键词 Wireless Sensor network security Concealed data AGGREGATION In-network Processing Secure data AGGREGATION Homomorphic encryption Homomorphic MAC
在线阅读 下载PDF
Study of An Integrated Security Solution for Network Information System
7
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
在线阅读 下载PDF
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
8
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
在线阅读 下载PDF
WIN32-CSP密码服务体系及其应用
9
作者 何正兵 李祥 《信息安全与通信保密》 2000年第2期30-33,共4页
根据微软32位平台的加密服务提供程序CSP,讨论了微软的网络安全及其有关网络安全的数字加密与数字签名体系,并利用CSP提供的用户编程接口API。讨论为网络事务提供安全支持的编程方法。
关键词 WIN32 密码 微软 事务 网络安全 编程方法 编程接口 服务体系 用户 服务提供
原文传递
Secure Remote Access IPSEC Virtual Private Network to University Network System 被引量:1
10
作者 Gajendra Sharma 《Journal of Computer Science Research》 2021年第1期16-27,共12页
With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construct... With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet. 展开更多
关键词 IPSEC VPN network Communication data encryption Integrity authentication Remote access UNIVERSITY security Server CLIENT PEER
在线阅读 下载PDF
Binary Multifold Encryption Technique for Complex Cloud Systems
11
作者 N.Ansgar Mary T.Latha 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1199-1213,共15页
Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid... Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated usinga variety of molecular methods. Many security mechanisms including knowledgebased authentication, two-factor authentication, adaptive authentication, multifactorauthentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most ofthem are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique Hybrid helix scuttle-deoxy ribo nucleic acids(HHS-DNA) encryption algorithm has been proposed which is inspired by DNAcryptography and Helix scuttle. The proposed HHS-DNA is a type of multifold binary version of DNA (MF-BDNA). The major role of this paper is to present a multifold HHS-DNA algorithm to encrypt the cloud data assuring more security with lesscomplexity. The experimentation is carried out and it reduces the encryption time,cipher text size, and improves throughput. When compared with previous techniques, there is a 45% improvement in throughput, 37% fast in encryption time,54.67% cipher text size. The relevant experimental results and foregoing analysisshow that this method is of good robustness, stability, and security. 展开更多
关键词 CRYPTOGRAPHY cloud network deoxy ribo nucleic acid(DNA) encryption security cloud service provider(csp)
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法 被引量:4
12
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
智能轨道交通数据安全防护体系:挑战、技术与未来演进
13
作者 陈磊 杨玉欣 公备 《都市快轨交通》 北大核心 2025年第5期8-14,共7页
为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点... 为解决轨道交通数据规模急剧膨胀、数据价值不断提升导致的安全问题,对智能轨道交通数据的安全防护体系进行研究。首先梳理轨道交通数据具有的多源异构、高实时性及强敏感性的特征,并分析在数据传输、存储和处理过程中的主要安全风险点;然后探讨针对网络攻击、数据泄露等威胁的联邦学习、轻量级加密、动态访问控制等前沿防护技术在资源受限环境下的应用现状、适用条件与性能表现;最后提出人工智能赋能的主动防御、跨系统协同治理等智能轨道交通数据安全未来的重点研究方向。研究结果表明:联邦学习可有效解决数据孤岛问题,在保证隐私前提下提升模型训练效率;轻量级加密算法在轨旁设备中展现出毫秒级响应优势,具有显著的应用潜力,是未来的发展趋势。研究成果可以为构建高效、可靠的智能轨道交通数据安全防护体系提供理论支撑和实践指导。 展开更多
关键词 轨道交通 数据安全 网络安全 隐私保护 加密技术
在线阅读 下载PDF
未知环境下激光雷达网络通信数据加密传输研究
14
作者 魏爽 杨明 龙草芳 《激光杂志》 北大核心 2025年第11期141-148,共8页
由于未知环境可能引入多种不确定因素,如信号衰减、多径效应及潜在的恶意攻击等,传统的单一加密方法难以全面应对,导致数据极易遭受未知环境干扰、窃听或篡改的风险。为了有效防止激光雷达网络通信数据在传输过程中被泄露,提出一种未知... 由于未知环境可能引入多种不确定因素,如信号衰减、多径效应及潜在的恶意攻击等,传统的单一加密方法难以全面应对,导致数据极易遭受未知环境干扰、窃听或篡改的风险。为了有效防止激光雷达网络通信数据在传输过程中被泄露,提出一种未知环境下激光雷达网络通信数据加密传输方法。采用多混沌映射加密方法对未知环境下的激光雷达网络通信数据展开首轮加密,通过生成混沌序列作为密钥,结合密文回馈机制,有效增强了数据的抗破解能力。其次,依据通信数据传输的实际需求和标准,采集并转换初始通信数据,设定通信数据传输节点传输索引值,构建最小叠交多路径传输结构,确保首轮加密数据在复杂环境中的稳定传输。在上述基础上,利用同态加密算法对通信数据展开二次加密,同时组建未知环境下激光雷达网络通信数据加密传输模型,通过模型有效实现通信数据传输加密。实验结果表明,所提方法可以显著降低误比特率,提升激光雷达网络通信数据的安全系数和数据包投递率,有效保证通信数据的安全传输。 展开更多
关键词 未知环境 激光雷达网络 通信数据 多混沌映射加密 同态加密 数据传输安全
原文传递
计算机网络安全防护中数据加密技术的应用 被引量:1
15
作者 田凌燕 《软件》 2025年第2期150-152,共3页
安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、... 安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、性能评估分析等多个角度探讨了在计算机网络安全防护中使用数据加密技术的关键要点。希望可以为相关人士提供帮助和借鉴,深化数据加密技术的实践应用。 展开更多
关键词 计算机 网络安全 防护 数据加密技术 应用
在线阅读 下载PDF
面向分布式数据安全共享的高速公路路网拥堵监测 被引量:3
16
作者 李林锋 陈羽中 +1 位作者 姚毅楠 邵伟杰 《福建师范大学学报(自然科学版)》 北大核心 2025年第1期11-20,共10页
应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像... 应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像头实时数据,在密态可计算的同态加密联邦学习智能决策架构下,建立基于道路区间优化的拥堵状态监测模型。结果表明,在确保分布式数据安全共享的前提下,能够有效实现高速路网道路拥堵状态监测。 展开更多
关键词 高速公路路网 道路拥堵状态 数据安全共享 智能决策 联邦学习 同态加密
在线阅读 下载PDF
实验室气体钢瓶无线传感监测系统设计与应用
17
作者 罗士波 陈章迎 《实验室研究与探索》 北大核心 2025年第12期255-262,共8页
为解决实验室气体泄漏可能引发事故的问题,设计并搭建了一套基于无线网络的气体钢瓶泄漏监测系统。该系统以BW16为核心构建主控制平台,采用支持2.4/5 GHz双频无线传输、网络接入身份认证与数据加密协议的架构,通过气敏传感器动态、周期... 为解决实验室气体泄漏可能引发事故的问题,设计并搭建了一套基于无线网络的气体钢瓶泄漏监测系统。该系统以BW16为核心构建主控制平台,采用支持2.4/5 GHz双频无线传输、网络接入身份认证与数据加密协议的架构,通过气敏传感器动态、周期性地采集气体体积浓度数据,并依据预设报警阈值实时监控与智能干预。通过在华东理工大学20余栋实验楼的220个气体钢瓶监测点部署应用后,实验结果表明:该系统信号干扰少,数据传输速率快、平均时延低于20 ms,具备安全、可靠和稳定的通信性能,且运维的成本显著降低。该系统推动了实验室气体钢瓶监测从“人防”向“技防”的转变,有效保障了实验室人员与财产安全,为高校实验室气体钢瓶泄漏监测提供了一个高效、低成本的解决方案。 展开更多
关键词 气体钢瓶 气敏传感器 网络接入身份认证 安全数据加密协议
在线阅读 下载PDF
基于对称加密的激光雷达网络电子通讯数据安全传输方法 被引量:2
18
作者 牟小令 《激光杂志》 北大核心 2025年第3期175-180,共6页
激光雷达网络电子通讯作为当前关键通讯技术之一,随着其应用范围的不断扩大,面对的安全风险程度也随之增加,导致电子通讯数据传输的安全性无法得到有效保障。因此,本文提出一种基于对称加密的激光雷达网络电子通讯数据安全传输方法研究... 激光雷达网络电子通讯作为当前关键通讯技术之一,随着其应用范围的不断扩大,面对的安全风险程度也随之增加,导致电子通讯数据传输的安全性无法得到有效保障。因此,本文提出一种基于对称加密的激光雷达网络电子通讯数据安全传输方法研究。该方法通过引入对称加密算法,搭建激光雷达网络电子通讯数据安全传输框架。在该框架下,电子通讯数据经过数据处理、字节代换、行移位、列混淆与轮密钥添加等环节进行加密,同时确定密钥扩展模式。解密过程则通过密文处理、逆向行移位、逆向字节代换、逆向列混淆与逆向轮密钥添加等环节完成,从而实现电子通讯数据的安全传输。实验结果显示:应用提出方法获得的电子通讯数据安全传输时间最小值为1 s,电子通讯数据传输丢失率最小值为0.6%,充分证实了提出方法应用性能较佳。 展开更多
关键词 电子通讯 激光雷达网络 数据传输 对称加密算法 通讯数据 安全性
原文传递
数据加密技术在计算机网络安全中的应用研究 被引量:9
19
作者 宋彦京 《数字通信世界》 2025年第1期124-126,共3页
在信息化环境中,计算机网络已然发展成为大众生活工作中必不可少的一种工具。然而,在网络功能越来越丰富的同时,网络安全问题也日益突出。病毒入侵、黑客攻击都会威胁到用户的人身和财产安全,为此,引入数据加密技术十分必要。在数据加... 在信息化环境中,计算机网络已然发展成为大众生活工作中必不可少的一种工具。然而,在网络功能越来越丰富的同时,网络安全问题也日益突出。病毒入侵、黑客攻击都会威胁到用户的人身和财产安全,为此,引入数据加密技术十分必要。在数据加密技术的辅助下,计算机网络可充分满足用户的需求,有效规避数据安全风险,并加强网络系统的安全性能。基于这一背景,本文介绍了数据加密技术,着重探究其在计算机网络安全中的应用意义与策略要点。 展开更多
关键词 计算机网络 网络安全 数据加密 技术应用
在线阅读 下载PDF
P4SinoCrypt:基于可编程数据平面的国密数据加密系统
20
作者 陈凯 张伟 《北京信息科技大学学报(自然科学版)》 2025年第2期58-65,共8页
针对现有终端信源加密方式以及专用加密网关方式存在的终端资源消耗大、加密网关部署不灵活等问题,设计了一套基于可编程数据平面的国密数据加密系统P4SinoCrypt,其核心是操作查找表(operation lookup table,OLT)。系统提前处理加密算... 针对现有终端信源加密方式以及专用加密网关方式存在的终端资源消耗大、加密网关部署不灵活等问题,设计了一套基于可编程数据平面的国密数据加密系统P4SinoCrypt,其核心是操作查找表(operation lookup table,OLT)。系统提前处理加密算法的密钥,将其制作成表放在可编程交换机中的匹配动作表(match-action table,MAT)中,当加密时通过该表进行直接查找,从而简化加密运算过程。在虚拟可编程软件交换机bmv2(behavioral model version2)及通用服务器上进行了实验。实验结果表明,在bmv2中,通过OLT技术优化后,SM4性能较服务器中提升明显,与高级加密标准(advanced encryption standard,AES)算法的差距大幅缩小,且P4SinoCrypt仅占用不到12%的可编程交换机内存。 展开更多
关键词 网络安全 数据加密 可编程数据平面 可编程交换机 SM4算法
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部