International Journal of Education and Management Engineering(IJEME)
ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)
Published By: MECS Press
IJEME Vol.2, No.2, Feb. 2012
Research of Network Security and Information Encryption
Full Text (PDF, 124KB), PP.74-80
In the process of rapid development of the computer network, the network security has been paid more attention. The essential nature of network security is the information safety on the internet. Primary studies have been done in this paper on the aspects of information encryption technology and the network security strategy.
Cite This Paper
Wan Hongli,"Research of Network Security and Information Encryption", IJEME, vol.2, no.2, pp.74-80, 2012.
HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense[M]. Beijing: Electronics Industry Press,2007
DENG Ju-long, Grey Forecast and Grey Decision, Wuhan:Huazhong University of Science and Technology Press,2002.
Shuanghe. P, Zhen. H, Changxiang. S, “Security Protocol and Scheme for Inter-Realm Information Accessing”, Journal of Computer Research and Development, 2005,42(9), pp.1587-1593(in Chinese)
Sheyner, J.Haines, S.Jha, R.Lippmann and J.Wing, “Automated Generation and Analysis of Attack Graphs”, In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2002..
Jason Thornton, Marios Savvides, and B. V. K. Vijaya Kumar, “An Evaluation of Iris Pattern Representations”, IEEE, 2007.
Yu Shaojun. E-Commerce Security Analysis and data encryption technology. China's management of information technology (Integrated version), 2007. (in Chinese)
D'Amico, A., Kocka, M., “Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned Visualization for Computer Security”, VizSEC 05, IEEE Press, 2005.10, pp. 110-112.
Xiaobin, Tan; Yong, Zhang; Hongsheng, Xi, “Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness”, Computational Intelligence and Security, 2007, pp. 853 – 857(in Chinese)