Sun et al., 2025 - Google Patents
Exploration of the Application of Data Encryption Technology in Computer Network Communication EngineeringSun et al., 2025
View PDF- Document ID
- 7257214384561031494
- Author
- Sun W
- Zou C
- Publication year
- Publication venue
- Artificial Intelligence Technology Research
External Links
Snippet
Exploration of the Application of Data Encryption Technology in Computer Network
Communication Engineering Page 1 - 76 - 10.70711/aitr.v2i6.5748 Exploration of the
Application of Data Encryption Technology in Computer Network Communication …
- 238000005516 engineering process 0 title abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Security algorithms for cloud computing | |
US9203610B2 (en) | Systems and methods for secure peer-to-peer communications | |
Olaiya et al. | Encryption techniques for financial data security in fintech applications | |
Agarwal et al. | Authenticating cryptography over network in data | |
Kılıç | Encryption methods and comparison of popular chat applications | |
CN112202773B (en) | Computer network information security monitoring and protection system based on internet | |
US20080044023A1 (en) | Secure Data Transmission | |
Chaeikar et al. | Secure SMS transmission based on social network messages | |
CN114942729A (en) | Data safety storage and reading method for computer system | |
Mata et al. | Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish) | |
Sun et al. | Exploration of the Application of Data Encryption Technology in Computer Network Communication Engineering | |
Kumar | DecenCrypto cloud: decentralized cryptography technique for secure communication over the clouds | |
Rishu et al. | Advancements in encryption techniques for enhanced data security over cloud | |
Chaudhari et al. | Securing Digital Information Using Cryptography Techniques to Enhance IT Security | |
Kaur et al. | Cryptography in cloud computing | |
Verma et al. | A hybrid two layer attribute based encryption for privacy preserving in public cloud | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
Al-Attab et al. | Hybrid data encryption technique for data security in cloud computing | |
Gan | Review on Cryptography Techniques in Network Security | |
Cernov | Security in Computer Networks | |
Nair | Data security using a hybrid cryptographic approach in mobile cloud computing | |
Tripathi | Using role-based access to store data on Cloud securely | |
Saini et al. | Cryptographic hybrid model-an advancement in cloud computing security: a survey | |
Sartika | Critical Phishing Defense Strategies and Digital Asset Protection: The Role of Cryptography in Protecting Digital Asset | |
Ali et al. | A Study On Network Security and Cryptography |