The application of data encryption technology in computer network communication security

G Liu - Mobile Information Systems, 2022 - Wiley Online Library
… to study the application of data encryption technology in computer network communication
… When using encryption technology to protect database security, a perfect design is required. …

A computer security system for cloud computing based on encryption technique

A Daniel, MO Momoh - Computer Engineering and …, 2021 - comengapp.unsri.ac.id
… a Computer Security System for Cloud Computing by employing a simple data protection
model where data is encrypted … was chosen to be the choice of this research material using in …

Research on the Application of Data Encryption Technology in Computer Network Security Based on Machine Learning

Y Song, M Chu - … on Information Systems and Computer Aided …, 2021 - ieeexplore.ieee.org
… For the protection of sensitive data sets, the simplest way … encryption algorithm and protect
sensitive information. At present, the existing privacy protection machine learning algorithms

Exploring the Application of Data Encryption Technology in Computer Network Security

J Li - Information and Knowledge Management, 2022 - clausiuspress.com
network information security has become the main research direction in this field. As an …
technology to protect computer network information security, data encryption technology is of …

A review on network security and cryptography

VB Savant, RD Kasar - … Journal of Engineering and Technology, 2021 - indianjournals.com
… to the internet it attracts a lot of cyber-attacks. Its required to protect computer and network
… In this paper we provide an overview on Network Security and various techniques through …

[PDF][PDF] Investigation of Cryptography Encryption for Network Protection.

DD Barak - … Journal of Computer Science & Management Studies, 2021 - ns2.ptcschool.in
Cryptography is a strategy for encryption applied to guard the organization, as various …
the cryptography with its points, structures and calculations. Interruption and PC insurance …

[图书][B] Computer system and network security

W Wolf, GB White, EA Fisch, SP Crago, UW Pooch… - 2017 - taylorfrancis.com
… to our computer systems and knowing what we can do to protect the … of general purpose
cryptographic techniques and then … Chapter 15 presents studies of several incidents that have …

[PDF][PDF] User selective encryption method for securing MANETs

A Ahmad, S Ismail - International Journal of Electrical and Computer …, 2018 - aurak.ac.ae
networks that’s make every transmission in such networks … a user selective encryption
method by operating Data Encryption … In this study, the proposed method named Selective …

A Review of Information Security using Cryptography Technique.

N Sharma - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
… the cryptography algorithm which is based on block cipher … If we are protecting confidential
information then cryptographyCryptography is the methods that allow information to be sent …

Problems of the advanced encryption standard in protecting Internet of Things sensor networks

P Arpaia, F Bonavolonta, A Cioffi - Measurement, 2020 - Elsevier
… case study, related to a successful attack to an 8-bit IoT microcontroller protected by AES-128
algorithm, is … In this paper, the vulnerability of the AES cryptographic algorithm of an IoT …