Research on Data Encryption Technology
Vol 1, Issue 1, 2018
VIEWS - 497 (Abstract) 525 (PDF)
Abstract
Full Text:
PDFReferences
1. SY Wang. Talking about data encryption technology [J]. Journal of Chaohu University, 2013 (6): 88-89.
2. Y Zheng, CS Yang. Encryption and decryption combat entry [M]. Beijing: Electronic Industry Press, 2006.
3. GP Zhang. Network security in the application of information encryption [J]. Consumer Guide, 2008.
4. [XY Xie, BF Wei. Analysis of network information encryption technology [J]. Technology Square, 2007 (5): 129.
5. YH Li. Application of DES encryption algorithm in data security protection in file transmission [J]. Hubei: School of Electric
6. Power and Electronic Engineering, North China Electric Power University, 2012, (3): 06-009.
7. XL Cao. DES-based encryption algorithm [J]. Henan Vocational and Technical College, 2011, (4): 295-296,309.
8. J Li , XY Li. Data encryption in the DES encryption algorithm [J]. 2012, (2): 82-84.
9. XL Zhao. Network security technology course [M]. Beijing: National Defense Industry Press, 2014, (6): 93-95.
10. JW Hu. Network security and confidentiality [M]. Xi'an: Xi'an University of Electronic Science and Technology Press, 2013, (3): 112-114.
Refbacks
- There are currently no refbacks.
This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.