[go: up one dir, main page]

Sun et al., 2025 - Google Patents

Exploration of the Application of Data Encryption Technology in Computer Network Communication Engineering

Sun et al., 2025

View PDF
Document ID
7257214384561031494
Author
Sun W
Zou C
Publication year
Publication venue
Artificial Intelligence Technology Research

External Links

Snippet

Exploration of the Application of Data Encryption Technology in Computer Network Communication Engineering Page 1 - 76 - 10.70711/aitr.v2i6.5748 Exploration of the Application of Data Encryption Technology in Computer Network Communication …
Continue reading at ojs.scineer-pub.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
US9203610B2 (en) Systems and methods for secure peer-to-peer communications
Olaiya et al. Encryption techniques for financial data security in fintech applications
Agarwal et al. Authenticating cryptography over network in data
Kılıç Encryption methods and comparison of popular chat applications
CN112202773B (en) Computer network information security monitoring and protection system based on internet
US20080044023A1 (en) Secure Data Transmission
Chaeikar et al. Secure SMS transmission based on social network messages
CN114942729A (en) Data safety storage and reading method for computer system
Mata et al. Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish)
Sun et al. Exploration of the Application of Data Encryption Technology in Computer Network Communication Engineering
Kumar DecenCrypto cloud: decentralized cryptography technique for secure communication over the clouds
Rishu et al. Advancements in encryption techniques for enhanced data security over cloud
Chaudhari et al. Securing Digital Information Using Cryptography Techniques to Enhance IT Security
Kaur et al. Cryptography in cloud computing
Verma et al. A hybrid two layer attribute based encryption for privacy preserving in public cloud
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Al-Attab et al. Hybrid data encryption technique for data security in cloud computing
Gan Review on Cryptography Techniques in Network Security
Cernov Security in Computer Networks
Nair Data security using a hybrid cryptographic approach in mobile cloud computing
Tripathi Using role-based access to store data on Cloud securely
Saini et al. Cryptographic hybrid model-an advancement in cloud computing security: a survey
Sartika Critical Phishing Defense Strategies and Digital Asset Protection: The Role of Cryptography in Protecting Digital Asset
Ali et al. A Study On Network Security and Cryptography