Discussion on Computer Communication Security Protocol and Its Analytical Technology

被引:0
|
作者
Xie, Fuwen [1 ]
机构
[1] GanNan Normal Univ, Coll Sci & Technol, Ganzhou 341000, Jiangxi, Peoples R China
关键词
Computer communication; security protocol; analytical technology;
D O I
10.1145/3292425.3292432
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's society is a highly information-based society and the network has become the mainstream of this era. With the popularization and widespread application of the network, the human life is more and more inseparable from the network, at the same time the communication security problem has gradually serious, it has brought great challenges to the computer communication technology, resulting in adverse effects and forming a serious threat. The communication security protocol is a cornerstone to create a network security environment and it is also an important measure of the construction of a safety network. Therefore, the adoption of network security protocol is a general trend.
引用
收藏
页码:72 / 74
页数:3
相关论文
共 50 条
  • [31] Computer Science Technology and Network Technology in the Application of the Computer Room Security
    Yang Zi-yan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1404 - 1406
  • [32] Security Protocol Deployment Risk (Transcript of Discussion)
    Christianson, Bruce
    SECURITY PROTOCOLS XVI, 2011, 6615 : 21 - 24
  • [33] Communication protocol analysis of computer networks
    Li, Layuan
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering & Electronics, 1995, 17 (10):
  • [34] Analysis and Discussion on Computer Network Security Issues
    Liu, Zhengliang
    Zheng, Xinyu
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 169 - 172
  • [35] Computer Database Security Management Analysis and Discussion
    Hu, Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 54 - 57
  • [36] Discussion on the Protection and Problem of Computer Network Security
    Wan, Biao
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347
  • [37] A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology
    Kannadhasan, S.
    Isaivani, M.
    Karthikeyan, G.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 633 - 643
  • [38] Research on Computer Security and Firewall Technology
    Chen, Ping
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 257 - 260
  • [39] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [40] Design and development of computer-based discussion support tool for science and technology communication exercise
    Ito, Kyoko
    Mizuno, Eriko
    Nishida, Shogo
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 356 - +