Encryption Technology for Computer Network Data Security Protection
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper...
Gespeichert in:
| Veröffentlicht in: | Security and communication networks Jg. 2022; S. 1 - 9 |
|---|---|
| 1. Verfasser: | |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
London
Hindawi
22.08.2022
John Wiley & Sons, Inc |
| Schlagworte: | |
| ISSN: | 1939-0114, 1939-0122 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect. |
|---|---|
| AbstractList | In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect. |
| Author | Yu, Yang |
| Author_xml | – sequence: 1 givenname: Yang orcidid: 0000-0003-3610-3901 surname: Yu fullname: Yu, Yang organization: Yantai Vocational CollegeYantaiShandong 264670Chinaytvc.edu.cn |
| BookMark | eNp9kM1OwzAQhC1UJNrCjQeIxBFKvXYTO0cUyo9UARLlbLkbh7q0cXAcVXl7EhVxQILL7B6-2R3NiAxKVxpCzoFeA8TxlFHGpiBkyhg7IkNIeTqhwNjgZ4fZCRnV9YbSBGZiNiTZvETfVsG6MloaXJdu697bqHA-ytyuaoLx0ZMJe-c_olsddPRqsPE2tNGLd8Fgbzwlx4Xe1ubse47J2918mT1MFs_3j9nNYoKci9BpziSVCUiUBniMHAshGYMcgcoikbpY5SgkpAlnyA0kwFHmWMi8E7HiY3JxuFt599mYOqiNa3zZvVRM0DROBYW4o9iBQu_q2ptCoQ26zxm8tlsFVPVlqb4s9V1WZ7r6Zaq83Wnf_oVfHvC1LXO9t__TX1P9eN0 |
| CitedBy_id | crossref_primary_10_3233_KES_230239 crossref_primary_10_3233_KES_230103 crossref_primary_10_1155_2023_9846460 crossref_primary_10_3233_JIFS_233181 |
| Cites_doi | 10.1155/2021/5548476 10.9734/ajrcos/2021/v8i230195 10.1109/tsg.2020.2971148 10.1155/2020/6724513 10.3390/catal11070828 10.3233/JIFS-189520 10.1155/2020/6633252 10.1515/nleng-2021-0050 10.1504/ijics.2021.10039968 10.1142/s0218126620500061 10.1155/2022/1200860 10.32628/cseit217334 10.1515/itit-2021-0059 10.31449/inf.v45i5.3600 10.1109/tsg.2019.2951505 10.3390/electronics10070785 10.1615/telecomradeng.v79.i13.80 10.1049/cim2.12024 10.1155/2020/2835023 10.5755/j01.itc.50.2.27570 10.1155/2020/8891185 10.1155/2020/6627178 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Yang Yu. Copyright © 2022 Yang Yu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Yang Yu. – notice: Copyright © 2022 Yang Yu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1155/2022/1789222 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Venkatesan, C. |
| Editor_xml | – sequence: 1 givenname: C. surname: Venkatesan fullname: Venkatesan, C. |
| EndPage | 9 |
| ExternalDocumentID | 10_1155_2022_1789222 |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAJEY AAONW ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATUGU AZVAB BCNDV BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS F1Z G-S GROUPED_DOAJ HCIFZ HZ~ IAO ICD ITC IX1 K7- LITHE MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHU RHW RHX TH9 TUS W99 WBKPD XV2 24P AAMMB AAYXX ACCMX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION H13 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c337t-c3d2808618c8e135c3cf78221dc108f68afbdc7819632c3e1613c8dcf8ddcf7b3 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000861380500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-0114 |
| IngestDate | Fri Jul 25 20:52:48 EDT 2025 Sat Nov 29 02:59:41 EST 2025 Tue Nov 18 21:02:54 EST 2025 Sun Jun 02 18:53:01 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-c3d2808618c8e135c3cf78221dc108f68afbdc7819632c3e1613c8dcf8ddcf7b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-3610-3901 |
| OpenAccessLink | https://dx.doi.org/10.1155/2022/1789222 |
| PQID | 2709597015 |
| PQPubID | 1046363 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_2709597015 crossref_citationtrail_10_1155_2022_1789222 crossref_primary_10_1155_2022_1789222 hindawi_primary_10_1155_2022_1789222 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-08-22 |
| PublicationDateYYYYMMDD | 2022-08-22 |
| PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-22 day: 22 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 22 23 24 25 27 28 10 J. Chen (5) 2020; 22 11 12 13 14 T. Ncubukezi (9) 2020; 3 15 16 17 18 L. Wu (3) 2020; 47 1 P. Elechi (19) 2021; 7 2 4 6 P. Krishnakumar (7) 2020; 8 8 20 S. Abdelgaber (26) 2020; 18 21 |
| References_xml | – volume: 3 start-page: 152 issue: 18 year: 2020 ident: 9 article-title: A proposed: integration of the Monte Carlo model and the bayes network to propose cyber security risk assessment tool for small and medium enterprises in South Africa publication-title: International Journal of Computer Science and Information Security – ident: 14 doi: 10.1155/2021/5548476 – ident: 25 doi: 10.9734/ajrcos/2021/v8i230195 – ident: 17 doi: 10.1109/tsg.2020.2971148 – volume: 47 start-page: 11 issue: 1 year: 2020 ident: 3 article-title: Applying of ga-bp neural network in the land ecological security evaluation publication-title: IAENG International Journal of Computer Science – volume: 18 start-page: 45 issue: 10 year: 2020 ident: 26 article-title: Converting Kuwait from electronic government to smart government publication-title: International Journal of Computer Science and Information Security – volume: 22 start-page: 145 issue: 1 year: 2020 ident: 5 article-title: Research on security of mobile communication information transmission based on heterogeneous network publication-title: International Journal on Network Security – ident: 18 doi: 10.1155/2020/6724513 – ident: 20 doi: 10.3390/catal11070828 – ident: 1 doi: 10.3233/JIFS-189520 – ident: 13 doi: 10.1155/2020/6633252 – ident: 12 doi: 10.1515/nleng-2021-0050 – ident: 6 doi: 10.1504/ijics.2021.10039968 – volume: 8 start-page: 63 issue: 2 year: 2020 ident: 7 article-title: An overview on wormhole attack in wireless sensor networks publication-title: International Journal of Innovative Research in Computer and Communication Engineering – ident: 4 doi: 10.1142/s0218126620500061 – ident: 28 doi: 10.1155/2022/1200860 – ident: 8 doi: 10.32628/cseit217334 – ident: 2 doi: 10.1515/itit-2021-0059 – ident: 27 doi: 10.31449/inf.v45i5.3600 – ident: 21 doi: 10.1109/tsg.2019.2951505 – ident: 23 doi: 10.3390/electronics10070785 – ident: 15 doi: 10.1615/telecomradeng.v79.i13.80 – ident: 16 doi: 10.1049/cim2.12024 – ident: 11 doi: 10.1155/2020/2835023 – ident: 24 doi: 10.5755/j01.itc.50.2.27570 – volume: 7 start-page: 1 issue: 1 year: 2021 ident: 19 article-title: Design and implementation of an automated security gate system using global system for mobile communication network publication-title: Journal of Network and Computer Applications – ident: 22 doi: 10.1155/2020/8891185 – ident: 10 doi: 10.1155/2020/6627178 |
| SSID | ssj0061474 |
| Score | 2.252466 |
| Snippet | In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security... |
| SourceID | proquest crossref hindawi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Computer networks Confidential documents Cybercrime Data encryption Data integrity Data transmission Demand analysis Digital signatures Number systems Systems design |
| Title | Encryption Technology for Computer Network Data Security Protection |
| URI | https://dx.doi.org/10.1155/2022/1789222 https://www.proquest.com/docview/2709597015 |
| Volume | 2022 |
| WOSCitedRecordID | wos000861380500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sUdCD-MRqLTnUkyxuko1Jj1JbepBSfEBvS3ayiwVZpV0V_73JbtZXEb0EApMcJpl8M5PhG4Cu7imtlZaBiSgLIpHJQDPKA43WmCyCWsgs2fWv5HisptPexJMkLZa_8C3aufCcnVGpehbKGtBQwlVuXY-m9YNrAUb6z2NX-kOjur79x9pvyLN270Le19nSE1ziynALNr1DSC6qE9yGlTTfgY0vNIG70B_kOH8rbZt8psKJdTdJ3ZSBjKtybnKpC01ufFM6MqlYGOzCPbgbDm77o8A3PwiQc1nY0TBl4w2qUKWUC-SYOTSnBmmosnOls8SgVM6CGPLUem4clcFMGTvIhO9DM3_M0wMgaZgwaSKh0MgIQ6GzTIZSyyyx_oVA3YLTWjExemZw16DiIS4jBCFip8bYq7EFJx_STxUjxi9yXa_jP8Ta9QHE3nwWMZMuPSmtq3L4v12OYN1NXbKXsTY0i_lzegyr-FLMFvMONFg06ZSX5h317rhc |
| linkProvider | Hindawi Publishing |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encryption+Technology+for+Computer+Network+Data+Security+Protection&rft.jtitle=Security+and+communication+networks&rft.au=Yu%2C+Yang&rft.date=2022-08-22&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F1789222&rft.externalDocID=10_1155_2022_1789222 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |