Study on the application of digital certificates in the protection of network information security and data integrity

被引:0
|
作者
机构
[1] Li, Hehua
[2] Wu, Chunling
来源
Li, H. (493885444@qq.com) | 1600年 / Academy Publisher, P.O.Box 40,, OULU, 90571, Finland卷 / 08期
关键词
D O I
10.4304/jnw.8.11.2592-2598
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A study on the role of hash function in encrypting sensitive information in network security protection
    Wu, Ju
    Wang, Dehong
    Peng, Xiaoxia
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [32] The Study on Network Information Security
    Sun, Yanqing
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 85 - 88
  • [33] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [34] Research of Computer Network Information Security and Protection Strategy
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2162 - +
  • [35] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [36] Analysis of Computer Network Information Security and Protection Strategy
    Ming, Xiaobo
    Chen, Ying
    Guo, Jinhua
    2018 2ND AASRI INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISC 2018), 2019, 267
  • [37] Study of Information System Security of Government Data Center Based on the Classified Protection
    Qian, Li
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 1315 - 1319
  • [38] Data protection and information security in biomedical research: A sequential explanatory mixed study
    Farah, Marialida
    Helou, Samar
    Raad, Elie
    El Helou, Elie
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2024, 192
  • [39] Scalable Frameworks for Application Security and Data Protection
    Kabanov, Ilya
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: THE SECURITY CHALLENGES OF THE CONNECTED WORLD, ICGS3 2017, 2016, 630 : 82 - 95
  • [40] Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques
    Chessa, Stefano
    Di Pietro, Roberto
    Ferro, Erina
    Giunta, Gaetano
    Oligeri, Gabriele
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 634 - 638