Research on Application of Data Encryption Technology in Computer Network Security Based on Multivariate Large Data Platform
@inproceedings{Liu2019ResearchOA, title={Research on Application of Data Encryption Technology in Computer Network Security Based on Multivariate Large Data Platform}, author={Jinyong Liu}, year={2019} }
Computer Network Application Has Become One of the Main Platforms for Enterprises and Individuals to Process Information and Data. in the Internet Database, Users Can Establish Private and Exclusive Network Storage Space to Save Personal Files and Information. Although the Era of Big Data Adds Luster to People's Life and Work, the Problem of Network Security Also Comes Quietly. Data Utilization Technology Has Made a Breakthrough Change, and Network Security Issues Have Naturally Become the… CONTINUE READING
Topics from this paper
References
SHOWING 1-10 OF 11 REFERENCES
Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing
- Computer Science
- Entropy
- 2015
- 36
- PDF
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
- Computer Science, Medicine
- Sensors
- 2015
- 28
- PDF
FPGA based unified architecture for public key and private key cryptosystems
- Computer Science
- Frontiers of Computer Science
- 2013
- 5
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
- Computer Science
- IEEE Transactions on Industrial Informatics
- 2013
- 75
- PDF
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
- Computer Science
- Int. J. Found. Comput. Sci.
- 2017
- 9
Secure and Efficient Image Retrieval over Encrypted Cloud Data
- Computer Science
- Secur. Commun. Networks
- 2018
- 4
- PDF
Secure data aggregation in wireless sensor networks using homomorphic encryption
- Computer Science
- 2015
- 16
Secure Count Query on Encrypted Genomic Data
- Computer Science, Medicine
- J. Biomed. Informatics
- 2018
- 13
- PDF
Secret handshake scheme with request-based-revealing
- Mathematics, Computer Science
- Comput. Math. Appl.
- 2013
- 2