糖尿病康复,内容丰富有趣,生活中的好帮手!
糖尿病康复 > 计算机网络安全相关的外国文献 网络安全与防范外文文献翻译中英文.doc

计算机网络安全相关的外国文献 网络安全与防范外文文献翻译中英文.doc

时间:2018-08-15 07:36:57

相关推荐

计算机网络安全相关的外国文献 网络安全与防范外文文献翻译中英文.doc

网络安全与防范外文文献翻译?(含:英文原文及中文译文)

文献出处: International Conference on Future Information, , 3(1) :15-27

英文原文 bounded ness, which including uselessly protects from other attacking ways outside firewall; hardly prevents the transmission of virus-contaminated software or file; barely rejects threats form internal users; scarcely prevents data-run attacks. In addition, because the secure policy of firewall is made by network administrator in company, his moral standard seems more important.

4.2 Encryption Technology

The aim of encryption is to protect data, file, password and controlling information in network, as well as protecting data transmitted in network. The process is actually carried out by various encrypt algorithm, which obtains some kind of protection with minimum costs. In most conditions, encryption is the only way for guaranteeing the information confidential importance. According to the way to classify cipher code between information sender and accepter, encryption system can usually be divided into symmetry cipher code (single key) and public cipher code (double key), such as DES and RSA can be the typical delegates. With high encryption as one of the advantages, symmetry cipher code manages difficulty by transmitting information with secure ways. The advantage of public cipher code can be made to apply to network open-ended requirements, and to fulfill digital signature and verification. However, algorithm is complex that will make a slow speed in data encryption. With the development of modem electronic technique and encryption technology, public cipher code algorithm will gradually become the mainstream in network security encryption system. People usually combine regular cipher and public one together in network security application. Regular network data encryption has link, node and end-to-end ways. As the most common used way of encryption, link encryption can be achieved between link layer and physical layer in network with hardware. It is used to

如果觉得《计算机网络安全相关的外国文献 网络安全与防范外文文献翻译中英文.doc》对你有帮助,请点赞、收藏,并留下你的观点哦!

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。