Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2021, 4(3); doi: 10.25236/AJCIS.2021.040315.

Research on Network Communication Data Encryption Method under the Security of Enterprise's Internal Network

Author(s)

Wei Li1,2,3, Ding Ma4, Limei Wang5

Corresponding Author:
Wei Li
Affiliation(s)

1School of Railway Engineering, Zhengzhou Railway Vocational and Technical College, China

2College of Civil Engineering and Architecture, Henan University of Technology, China

3Chongqing University Industrial Technology Research Institute, China

4Marketing, Limkokwing University of Creative Technology, Malaysia

5HR, Shenzhen Jieruitong Technology Co., Ltd, China

Abstract

With the continuous development of computer communication network technology, it is inevitable to deal with various security risks in the development process. In this regard, relevant departments must pay special attention to and take active and effective preventive measures. The typical application technology is data encryption technology. Data encryption technology can effectively ensure the integrity and confidentiality of data information in the process of computer network communication. Therefore, relevant technical personnel should strengthen the research on data encryption technology and promote the healthy and orderly development of computer network communication. This article focuses on the current status of communication network security, and studies typical data encryption technologies, with a view to helping to strengthen computer network security.

Keywords

Network security, data encryption, network communication, wireless channel

Cite This Paper

Wei Li, Ding Ma, Limei Wang. Research on Network Communication Data Encryption Method under the Security of Enterprise's Internal Network. Academic Journal of Computing & Information Science (2021), Vol. 4, Issue 3: 94-101. https://doi.org/10.25236/AJCIS.2021.040315.

References

[1] Liang Yonggang, She Yan, Liu Jianhua. Discussion on the use of "data encryption technology" to protect cultivated land based on GIS [A]. Proceedings of the 2018 Annual Conference of the Chinese Land Society [C]. 2018.

[2] Ma Ji, Wang Gang. A pseudo-attack encryption model based on fractal theory [A]. Proceedings of the Sixth Annual Conference of the Chinese Communications Society (Part 2) [C]. 2018.

[3] Wang Yanjun. Research on data encryption technology in computer network information security [J]. Communication World, 2017 (24): 24-25.

[4] Xu Xiaoyan. Analysis of the application value of data encryption technology in computer network security [J]. Journal of Jingdezhen College, 2016, 31(3): 24-26.

[5] Zheng Xiaolong, Shi Guihua. Research on data encryption technology in computer network information security [J]. Communication World, 2018 (09): 47-48.

[6] Tang Jie, Tan Jun. The specific application of data encryption technology in hospital computer network communication security [J]. China Informatization, 2018 (09): 50-52.

[7] Wu Sujuan. Application Research of Data Encryption Technology in Computer Network Security [J]. Computer Knowledge and Technology, 2017, (36): 8633-8634.

[8] Zhou Guangrui, Yu Guanjie. Discussion on the application of information encryption technology in computer network security [J]. Computer CD Software and Application, 2018, (18): 36+38.

[9] Wang Lixiang, Du Guozhen. Research on Data Encryption Technology of Computer Network [J]. Network Security Technology and Application, 2020(06): 34-35.

[10] Heng Liye. Research on Data Encryption and Abnormal Data Self-Destruction Technology in Network Information Security [J]. Network Security Technology and Application, 2020(06):35-36.

[11] Xu Dahai. Application of data encryption technology in computer network information security [J]. China New Communications, 2020, 22(10): 88-89.

[12] Wu Jingjing. Application analysis of data encryption technology in computer network security[J]. Computer Products and Circulation, 2020(06):41.

[13] Li Zun, Yu Hongping. Application of data encryption technology in computer network security [J]. Computer Products and Circulation, 2020(08): 29.

[14] Chen Yuexia. Application of Data Encryption Technology in Computer Network Security [J]. Network Security Technology and Application, 2020(05): 47-48.

[15] Liu Hui. Application Research of Data Encryption Technology in Computer Network Security [J]. Fireworks Technology and Market, 2020(02): 9.

[16] Xia Xiuyan. Application analysis of data encryption technology in computer network security [J]. Digital Communication World, 2020(05): 212.

[17] Lv Shaoxin. Application of data encryption technology in information network security [J]. Communication World, 2020, 27(04): 66-67.

[18] Bai Haijun. Analysis of the application of data encryption technology in computer network security [J]. Digital Communication World, 2020(04): 115.