Research of Network Security and Information Encryption

Автор: Wan Hongli

Журнал: International Journal of Education and Management Engineering(IJEME) @ijeme

Статья в выпуске: 2 vol.2, 2012 года.

Бесплатный доступ

In the process of rapid development of the computer network, the network security has been paid more attention. The essential nature of network security is the information safety on the internet. Primary studies have been done in this paper on the aspects of information encryption technology and the network security strategy.

Network security, information encryption, security strategy, network security algorithm

Короткий адрес: https://sciup.org/15013664

IDR: 15013664

Список литературы Research of Network Security and Information Encryption

  • HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense[M]. Beijing: Electronics Industry Press,2007
  • DENG Ju-long, Grey Forecast and Grey Decision, Wuhan:Huazhong University of Science and Technology Press,2002.
  • Shuanghe. P, Zhen. H, Changxiang. S, “Security Protocol and Scheme for Inter-Realm Information Accessing”, Journal of Computer Research and Development, 2005,42(9), pp.1587-1593(in Chinese)
  • Sheyner, J.Haines, S.Jha, R.Lippmann and J.Wing, “Automated Generation and Analysis of Attack Graphs”, In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2002..
  • Jason Thornton, Marios Savvides, and B. V. K. Vijaya Kumar, “An Evaluation of Iris Pattern Representations”, IEEE, 2007.
  • Yu Shaojun. E-Commerce Security Analysis and data encryption technology. China's management of information technology (Integrated version), 2007. (in Chinese)
  • D'Amico, A., Kocka, M., “Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned Visualization for Computer Security”, VizSEC 05, IEEE Press, 2005.10, pp. 110-112.
  • Xiaobin, Tan; Yong, Zhang; Hongsheng, Xi, “Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness”, Computational Intelligence and Security, 2007, pp. 853 – 857(in Chinese)
Еще
Статья научная