Encryption Technology for Computer Network Data Security Protection

In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks Jg. 2022; S. 1 - 9
1. Verfasser: Yu, Yang
Format: Journal Article
Sprache:Englisch
Veröffentlicht: London Hindawi 22.08.2022
John Wiley & Sons, Inc
Schlagworte:
ISSN:1939-0114, 1939-0122
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
AbstractList In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
Author Yu, Yang
Author_xml – sequence: 1
  givenname: Yang
  orcidid: 0000-0003-3610-3901
  surname: Yu
  fullname: Yu, Yang
  organization: Yantai Vocational CollegeYantaiShandong 264670Chinaytvc.edu.cn
BookMark eNp9kM1OwzAQhC1UJNrCjQeIxBFKvXYTO0cUyo9UARLlbLkbh7q0cXAcVXl7EhVxQILL7B6-2R3NiAxKVxpCzoFeA8TxlFHGpiBkyhg7IkNIeTqhwNjgZ4fZCRnV9YbSBGZiNiTZvETfVsG6MloaXJdu697bqHA-ytyuaoLx0ZMJe-c_olsddPRqsPE2tNGLd8Fgbzwlx4Xe1ubse47J2918mT1MFs_3j9nNYoKci9BpziSVCUiUBniMHAshGYMcgcoikbpY5SgkpAlnyA0kwFHmWMi8E7HiY3JxuFt599mYOqiNa3zZvVRM0DROBYW4o9iBQu_q2ptCoQ26zxm8tlsFVPVlqb4s9V1WZ7r6Zaq83Wnf_oVfHvC1LXO9t__TX1P9eN0
CitedBy_id crossref_primary_10_3233_KES_230239
crossref_primary_10_3233_KES_230103
crossref_primary_10_1155_2023_9846460
crossref_primary_10_3233_JIFS_233181
Cites_doi 10.1155/2021/5548476
10.9734/ajrcos/2021/v8i230195
10.1109/tsg.2020.2971148
10.1155/2020/6724513
10.3390/catal11070828
10.3233/JIFS-189520
10.1155/2020/6633252
10.1515/nleng-2021-0050
10.1504/ijics.2021.10039968
10.1142/s0218126620500061
10.1155/2022/1200860
10.32628/cseit217334
10.1515/itit-2021-0059
10.31449/inf.v45i5.3600
10.1109/tsg.2019.2951505
10.3390/electronics10070785
10.1615/telecomradeng.v79.i13.80
10.1049/cim2.12024
10.1155/2020/2835023
10.5755/j01.itc.50.2.27570
10.1155/2020/8891185
10.1155/2020/6627178
ContentType Journal Article
Copyright Copyright © 2022 Yang Yu.
Copyright © 2022 Yang Yu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Yang Yu.
– notice: Copyright © 2022 Yang Yu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2022/1789222
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
CrossRef
Technology Research Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Venkatesan, C.
Editor_xml – sequence: 1
  givenname: C.
  surname: Venkatesan
  fullname: Venkatesan, C.
EndPage 9
ExternalDocumentID 10_1155_2022_1789222
GroupedDBID .4S
.DC
05W
0R~
123
1OC
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAFWJ
AAJEY
AAONW
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATUGU
AZVAB
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
F1Z
G-S
GROUPED_DOAJ
HCIFZ
HZ~
IAO
ICD
ITC
IX1
K7-
LITHE
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHU
RHW
RHX
TH9
TUS
W99
WBKPD
XV2
24P
AAMMB
AAYXX
ACCMX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
H13
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c337t-c3d2808618c8e135c3cf78221dc108f68afbdc7819632c3e1613c8dcf8ddcf7b3
IEDL.DBID RHX
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000861380500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-0114
IngestDate Fri Jul 25 20:52:48 EDT 2025
Sat Nov 29 02:59:41 EST 2025
Tue Nov 18 21:02:54 EST 2025
Sun Jun 02 18:53:01 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-c3d2808618c8e135c3cf78221dc108f68afbdc7819632c3e1613c8dcf8ddcf7b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3610-3901
OpenAccessLink https://dx.doi.org/10.1155/2022/1789222
PQID 2709597015
PQPubID 1046363
PageCount 9
ParticipantIDs proquest_journals_2709597015
crossref_citationtrail_10_1155_2022_1789222
crossref_primary_10_1155_2022_1789222
hindawi_primary_10_1155_2022_1789222
PublicationCentury 2000
PublicationDate 2022-08-22
PublicationDateYYYYMMDD 2022-08-22
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-22
  day: 22
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 22
23
24
25
27
28
10
J. Chen (5) 2020; 22
11
12
13
14
T. Ncubukezi (9) 2020; 3
15
16
17
18
L. Wu (3) 2020; 47
1
P. Elechi (19) 2021; 7
2
4
6
P. Krishnakumar (7) 2020; 8
8
20
S. Abdelgaber (26) 2020; 18
21
References_xml – volume: 3
  start-page: 152
  issue: 18
  year: 2020
  ident: 9
  article-title: A proposed: integration of the Monte Carlo model and the bayes network to propose cyber security risk assessment tool for small and medium enterprises in South Africa
  publication-title: International Journal of Computer Science and Information Security
– ident: 14
  doi: 10.1155/2021/5548476
– ident: 25
  doi: 10.9734/ajrcos/2021/v8i230195
– ident: 17
  doi: 10.1109/tsg.2020.2971148
– volume: 47
  start-page: 11
  issue: 1
  year: 2020
  ident: 3
  article-title: Applying of ga-bp neural network in the land ecological security evaluation
  publication-title: IAENG International Journal of Computer Science
– volume: 18
  start-page: 45
  issue: 10
  year: 2020
  ident: 26
  article-title: Converting Kuwait from electronic government to smart government
  publication-title: International Journal of Computer Science and Information Security
– volume: 22
  start-page: 145
  issue: 1
  year: 2020
  ident: 5
  article-title: Research on security of mobile communication information transmission based on heterogeneous network
  publication-title: International Journal on Network Security
– ident: 18
  doi: 10.1155/2020/6724513
– ident: 20
  doi: 10.3390/catal11070828
– ident: 1
  doi: 10.3233/JIFS-189520
– ident: 13
  doi: 10.1155/2020/6633252
– ident: 12
  doi: 10.1515/nleng-2021-0050
– ident: 6
  doi: 10.1504/ijics.2021.10039968
– volume: 8
  start-page: 63
  issue: 2
  year: 2020
  ident: 7
  article-title: An overview on wormhole attack in wireless sensor networks
  publication-title: International Journal of Innovative Research in Computer and Communication Engineering
– ident: 4
  doi: 10.1142/s0218126620500061
– ident: 28
  doi: 10.1155/2022/1200860
– ident: 8
  doi: 10.32628/cseit217334
– ident: 2
  doi: 10.1515/itit-2021-0059
– ident: 27
  doi: 10.31449/inf.v45i5.3600
– ident: 21
  doi: 10.1109/tsg.2019.2951505
– ident: 23
  doi: 10.3390/electronics10070785
– ident: 15
  doi: 10.1615/telecomradeng.v79.i13.80
– ident: 16
  doi: 10.1049/cim2.12024
– ident: 11
  doi: 10.1155/2020/2835023
– ident: 24
  doi: 10.5755/j01.itc.50.2.27570
– volume: 7
  start-page: 1
  issue: 1
  year: 2021
  ident: 19
  article-title: Design and implementation of an automated security gate system using global system for mobile communication network
  publication-title: Journal of Network and Computer Applications
– ident: 22
  doi: 10.1155/2020/8891185
– ident: 10
  doi: 10.1155/2020/6627178
SSID ssj0061474
Score 2.252466
Snippet In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Computer networks
Confidential documents
Cybercrime
Data encryption
Data integrity
Data transmission
Demand analysis
Digital signatures
Number systems
Systems design
Title Encryption Technology for Computer Network Data Security Protection
URI https://dx.doi.org/10.1155/2022/1789222
https://www.proquest.com/docview/2709597015
Volume 2022
WOSCitedRecordID wos000861380500005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sUdCD-MRqLTnUkyxuko1Jj1JbepBSfEBvS3ayiwVZpV0V_73JbtZXEb0EApMcJpl8M5PhG4Cu7imtlZaBiSgLIpHJQDPKA43WmCyCWsgs2fWv5HisptPexJMkLZa_8C3aufCcnVGpehbKGtBQwlVuXY-m9YNrAUb6z2NX-kOjur79x9pvyLN270Le19nSE1ziynALNr1DSC6qE9yGlTTfgY0vNIG70B_kOH8rbZt8psKJdTdJ3ZSBjKtybnKpC01ufFM6MqlYGOzCPbgbDm77o8A3PwiQc1nY0TBl4w2qUKWUC-SYOTSnBmmosnOls8SgVM6CGPLUem4clcFMGTvIhO9DM3_M0wMgaZgwaSKh0MgIQ6GzTIZSyyyx_oVA3YLTWjExemZw16DiIS4jBCFip8bYq7EFJx_STxUjxi9yXa_jP8Ta9QHE3nwWMZMuPSmtq3L4v12OYN1NXbKXsTY0i_lzegyr-FLMFvMONFg06ZSX5h317rhc
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encryption+Technology+for+Computer+Network+Data+Security+Protection&rft.jtitle=Security+and+communication+networks&rft.au=Yu%2C+Yang&rft.date=2022-08-22&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F1789222&rft.externalDocID=10_1155_2022_1789222
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon