Analysis and Comparison of Network Information Security Encryption Technology
Authors
Qiuyan Tian, Hao Kang, Ting Ai, Long Fei
Corresponding Author
Qiuyan Tian
Available Online May 2018.
- DOI
- 10.2991/amcce-18.2018.117How to use a DOI?
- Keywords
- network; information security; encryption; password
- Abstract
This article not only describes the network information security encryption mechanisms, but also analyzes the advantage of symmetric cryptography and asymmetric cryptography. It points out the problems which are noted in the application and compares the information encryption technology commonly used. Finally, this article prospects the development and application of information encryption technology.
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Qiuyan Tian AU - Hao Kang AU - Ting Ai AU - Long Fei PY - 2018/05 DA - 2018/05 TI - Analysis and Comparison of Network Information Security Encryption Technology BT - Proceedings of the 2018 3rd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2018) PB - Atlantis Press SP - 678 EP - 682 SN - 2352-5401 UR - https://doi.org/10.2991/amcce-18.2018.117 DO - 10.2991/amcce-18.2018.117 ID - Tian2018/05 ER -