The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1155/2022/2745334
|View full text |Cite|
|
Sign up to set email alerts
|

Application of Data Encryption Technology in Network Information Security Sharing

Abstract: In order to solve the problem of user information insecurity in the process of network information security sharing, this study proposes a data encryption technology based on network information security sharing. This method applies the data encryption technology to the computer network security protection, which can not only improve the computer network security but also protect the user data information security and provide users with more efficient and high-quality computer network services. The experimenta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
1
0
Order By: Relevance
“…Speci cally, based on the data lifecycle, the challenges can be classi ed into ve areas which are showing in Fig. 3 [32][33][34].…”
Section: Security and Privacy Challenges Of Data Middle Platformmentioning
confidence: 99%
“…Speci cally, based on the data lifecycle, the challenges can be classi ed into ve areas which are showing in Fig. 3 [32][33][34].…”
Section: Security and Privacy Challenges Of Data Middle Platformmentioning
confidence: 99%
“…Tis article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%