Security Risks in Computer Networks and Application of Data Encryption Techniques
DOI:
https://doi.org/10.54097/x4eym481Keywords:
data encryption techniques, computer networks, security, algorithmsAbstract
With the rapid development of science and technology, people through the computer network for the transmission and exchange of information and data is more and more convenient. This paper analyzes the current situation of computer network security, hidden dangers and the principle of data encryption technology, and discusses the application of data encryption technology in computer network security.
References
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet computing, 16(1), 69-73.
Dawoud, W., Takouna, I., & Meinel, C. (2010, March). Infrastructure as a service security: Challenges and solutions. In 2010 the 7th International Conference on Informatics and Systems (INFOS) (pp. 1-8). IEEE.
Rosegrant, M. W., & Cline, S. A. (2003). Global food security: challenges and policies. Science, 302(5652), 1917-1919.
Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
Barnett, J. (2003). Security and climate change. Global environmental change, 13(1), 7-17.
Levy, M. A. (1995). Is the environment a national security issue?. International security, 20(2), 35-62.
Li, X., Wang, X., Chen, X., Lu, Y., Fu, H., & Wu, Y. C. (2024). Unlabeled data selection for active learning in image classification. Scientific Reports, 14(1), 424.
Liang, Y., Wang, X., Wu, Y. C., Fu, H., & Zhou, M. (2023). A Study on Blockchain Sandwich Attack Strategies Based on Mechanism Design Game Theory. Electronics, 12(21), 4417.
Lee, Zhitong, Ying Cheng Wu, and Xukang Wang. "Automated Machine Learning in Waste Classification: A Revolutionary Approach to Efficiency and Accuracy." Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition. 2023.
Guo, H., Ma, Z., Chen, X., Wang, X., Xu, J., & Zheng, Y. (2024). Generating Artistic Portraits from Face Photos with Feature Disentanglement and Reconstruction. Electronics, 13(5), 955.
Wang, X., Wu, Y. C., Ma, Z. (2024). Blockchain in the courtroom: exploring its evidentiary significance and procedural implications in U.S. judicial processes. Frontiers in Blockchain, 7, 1306058.
Lehtinen, R., & Gangemi Sr, G. T. (2006). Computer security basics: computer security. " O'Reilly Media, Inc.".
Landwehr, C. E. (1983). The best available technologies for computer security. Computer, 16(07), 86-100.
Richards, N. M., & Solove, D. J. (2010). Prosser's privacy law: A mixed legacy. Calif. L. Rev., 98, 1887.
Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (2014). Computer security. Academic Press.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.