Retracted: Computer Network Security Management of Data Encryption Technology

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Mining Technology for Efficient Network Security Management

Several Network systems are suffering from various security threats including network worms, large scale network attacks, etc, and network security situation awareness is an effective way for solve these problems. The general process is to perceive the network security events happened in a certain time period and cyberspace environment, synthetically manipulate the security data, analyse the at...

متن کامل

Security and Management of Local Computer Data

In the computer system, only the data storing in the computer are the real fortune, and the protection of information and data are crucial. In the day that data security becomes more and more important, the stable and self-contained backup system has been the key to ensure the normal running of the system. Data backup is not only the conservation of data, but includes more important content, i....

متن کامل

Data Security Management in Distributed Computer Systems

This research deals with data security management in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security management in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryptio...

متن کامل

Sensor Data Encryption Protocol for Wireless Network Security

Wireless Sensor Network consisting of a large number of sensor nodes that connected through wireless media has emerged as a ground breaking technology that offers unprecedented ability to monitor the physical word accurately. The privacy preservation is an important issue in wireless sensor network. Developing effective security solutions for wireless sensor networks are not easy due to limited...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2023

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2023/9893172