Research of Network Security and Information Encryption

Full Text (PDF, 124KB), PP.74-80

Views: 0 Downloads: 0

Author(s)

Wan Hongli 1,*

1. Computer Science and Technology Department, Neusoft Institute of Information, Dalian, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2012.02.12

Received: 9 Nov. 2011 / Revised: 15 Dec. 2011 / Accepted: 18 Jan. 2012 / Published: 29 Feb. 2012

Index Terms

Network security, information encryption, security strategy, network security algorithm

Abstract

In the process of rapid development of the computer network, the network security has been paid more attention. The essential nature of network security is the information safety on the internet. Primary studies have been done in this paper on the aspects of information encryption technology and the network security strategy.

Cite This Paper

Wan Hongli,"Research of Network Security and Information Encryption", IJEME, vol.2, no.2, pp.74-80, 2012. DOI: 10.5815/ijeme.2012.02.12 

Reference

[1]HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense[M]. Beijing: Electronics Industry Press,2007

[2]DENG Ju-long, Grey Forecast and Grey Decision, Wuhan:Huazhong University of Science and Technology Press,2002.

[3]Shuanghe. P, Zhen. H, Changxiang. S, “Security Protocol and Scheme for Inter-Realm Information Accessing”, Journal of Computer Research and Development, 2005,42(9), pp.1587-1593(in Chinese)

[4]Sheyner, J.Haines, S.Jha, R.Lippmann and J.Wing, “Automated Generation and Analysis of Attack Graphs”, In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2002..

[5]Jason Thornton, Marios Savvides, and B. V. K. Vijaya Kumar, “An Evaluation of Iris Pattern Representations”, IEEE, 2007.

[6]Yu Shaojun. E-Commerce Security Analysis and data encryption technology. China's management of information technology (Integrated version), 2007. (in Chinese)

[7]D'Amico, A., Kocka, M., “Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned Visualization for Computer Security”, VizSEC 05, IEEE Press, 2005.10, pp. 110-112.

[8]Xiaobin, Tan; Yong, Zhang; Hongsheng, Xi, “Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness”, Computational Intelligence and Security, 2007, pp. 853 – 857(in Chinese)