Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Application of DES File Encryption in Network Security
Aviation Meteorological Center of SouthwestAir Traffic Bureau
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract   Network security has attracted more and more people's attention, and data encryption technology provides more reliable guarantee for network security. This paper mainly uses the Visual Studio programming platform for the software programming of encrypt DES data, and realizes the application of DES data encryption algorithm in network communication, which has achieved good results in practical applications.
Key words network security      DES data encryption      Visual Studio programming platform      network communication     
Published: 13 July 2019

Cite this article:

ZHANG Yu. Application of DES File Encryption in Network Security. Computer & Telecommunication, 2019, 1(7): 49-.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2019/V1/I7/49

[1] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[2] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[3] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[4] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[5] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[6] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[7] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[8] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[9] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[10] FAN Miao-miao. Analysis of WSN Network Security Management Mechanism[J]. 电脑与电信, 2018, 1(12): 84-86.
[11] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[12] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
[13] WANG Kun. Research on the Detection and Prevention of Network Anonymous Proxy[J]. 电脑与电信, 2017, 1(12): 47-49.
[14] TANG Jun-ming. Network Security Analysis Method for Big Data[J]. 电脑与电信, 2017, 1(12): 62-63.
[15] XUE Jin-song , FENG Ren-jun. Network security technology based on LAN environment[J]. 电脑与电信, 2017, 1(11): 92-94.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd