Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (5): 37-39    DOI:
Current Issue | Archive | Adv Search |
Research on Personal Information Security on Internet
WU Hai-jun
Henan University of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the development and progress of the economy and society and the arrival of the network era, we have fully enjoyed the convenience brought by the information age, and the influence of information on people's lives have become increasingly prominent. However, the risk of improper use of personal information is increasing, such as the credit card theft, mobile phone fraud, and so on. The serious leakage of personal information not only involves personal reputation, but also disturbs the normal order of production and life. Therefore, this paper analyzes the existing countermeasures to prevent the leakage of personal information on the Internet, and on this basis, puts forward a more perfect solution, and uses domestic cryptography technology to realize the omni-directional protection of personal information security on Internet.
Key wordsnetwork      information      leakage     
Published: 12 August 2019
ZTFLH:  TP391  

Cite this article:

WU Hai-jun. Research on Personal Information Security on Internet. Computer & Telecommunication, 2019, 1(5): 37-39.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2019/V1/I5/37

[1] LI Dan. Simulation of Underwater Acoustic Sensor Network Dynamic Topology in Beibu Gulf[J]. 电脑与电信, 2021, 1(8): 18-21.
[2] SU Yan-tao ZHEN Zhong-qiang OU Lin-bo. A Solution for Smart Steel Mills Based on 5G SA[J]. 电脑与电信, 2021, 1(8): 40-43.
[3] ZHANG Jing. Exploration on the Experimental Teaching Model of Software and Hardware Collaborative Development in Universities[J]. 电脑与电信, 2021, 1(8): 67-69.
[4] LI Yan-hang WANG Zhi-guo MAO Jian-fang . Research on Information Literacy Education Reform of Higher Vocational Colleges Based on Class-competition Integration[J]. 电脑与电信, 2021, 1(7): 8-11.
[5] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[6] SONG Man. A Film Collaborative Filtering Algorithm Based on BP Neural Network[J]. 电脑与电信, 2021, 1(6): 13-18.
[7] WANG Jin-hua YIN Xiao-hua. Research and Practice of SPOC Hybrid Teaching Mode Based on Cloud Class Network Platform ——an Example of Foundation of Computer Networks[J]. 电脑与电信, 2021, 1(6): 33-37.
[8] LIU Li-nan. CT Inversion Algorithm Based on BP Neural Network Optimized by Quantum Particle Swarm Optimization [J]. 电脑与电信, 2021, 1(6): 57-64.
[9] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[10] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[11] FU Sen HE Zhen-xiang. A Black Box Attack on a Network Traffic Intrusion Detection System[J]. 电脑与电信, 2021, 1(5): 46-51.
[12] WU He-sheng ZHANG Hua-long. Analysis on the Integration and Sharing of Information Resources Based on Prison Informatization[J]. 电脑与电信, 2021, 1(5): 75-.
[13] MA Jin-feng. Facial Expression Recognition Based on Dense Connected Convolution Structure[J]. 电脑与电信, 2021, 1(4): 1-5.
[14] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[15] DENG Rui WEI Sheng-nan. Sewage Quality Prediction Based on LSTM Neural Network and DBSCAN Algorithm[J]. 电脑与电信, 2021, 1(4): 66-73.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd