Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (5): 37-39    DOI:
Current Issue | Archive | Adv Search |
Research on Personal Information Security on Internet
WU Hai-jun
Henan University of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the development and progress of the economy and society and the arrival of the network era, we have fully enjoyed the convenience brought by the information age, and the influence of information on people's lives have become increasingly prominent. However, the risk of improper use of personal information is increasing, such as the credit card theft, mobile phone fraud, and so on. The serious leakage of personal information not only involves personal reputation, but also disturbs the normal order of production and life. Therefore, this paper analyzes the existing countermeasures to prevent the leakage of personal information on the Internet, and on this basis, puts forward a more perfect solution, and uses domestic cryptography technology to realize the omni-directional protection of personal information security on Internet.
Key wordsnetwork      information      leakage     
Published: 12 August 2019
:  TP391  

Cite this article:

WU Hai-jun. Research on Personal Information Security on Internet. Computer & Telecommunication, 2019, 1(5): 37-39.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2019/V1/I5/37

[1] LI Gai GUO Ze-hao. TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust[J]. 电脑与电信, 2024, 1(6): 7-10.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] XU Jian-lin JIANG Jing WANG Kai-gui ZHAO Ping-zhong. Research on the Optimization Measures and Application of High-speed Railway Private Network [J]. 电脑与电信, 2024, 1(6): 85-94.
[4] GAO Su-ling LI Xiao-qin HAO Chao. Exploration and Practice of Mixed Teaching Based on the Concept of Engineering Education Certification——Take Information Theory and Coding for Example[J]. 电脑与电信, 2024, 1(6): 99-103.
[5] WANG Yu-lin WANG Jin-heng ZHAO Yu-qi XIE Xiao-hui. Teaching Innovation and Practice of "Triple Optimization and Innovation" in the Course of Database Principle and Application in Private Universities under the Background of Information Technology Innovation[J]. 电脑与电信, 2024, 1(5): 42-.
[6] REN Hao. Expression Recognition Method Combined with Attention Feature Fusion[J]. 电脑与电信, 2024, 1(5): 71-.
[7] WANG Jin WANG Rui. Facial Expression Recognition Algorithm Based on Multi-scale Feature Deep Learning[J]. 电脑与电信, 2024, 1(5): 75-.
[8] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[9] YUAN Li-ning, XING Zhong-yu, YANG Guo-yi LUO Heng-yu.
Crime Organization Member Relationship Prediction Based on Graph Embedding Model
[J]. 电脑与电信, 2024, 1(4): 1-5.
[10] RU Chun-rui  DANG Xiao-chao. CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network[J]. 电脑与电信, 2024, 1(3): 1-6.
[11] WU Guo-song. The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy[J]. 电脑与电信, 2024, 1(3): 7-.
[12] YOU Dan-dan LUO Shao-ye. The Literature Review about Sentiment Analysis in Network Public Opinion Research in China[J]. 电脑与电信, 2024, 1(3): 64-.
[13] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[14] WANG Fang. A Wireless Local Area Network Intrusion Signal Detection Method Based on GA-SVM Algorithm[J]. 电脑与电信, 2024, 1(1): 47-49.
[15] SONG Hui  WAN Chan-chan. Accurate Construction and Digital Management of 5G Base Stations[J]. 电脑与电信, 2024, 1(1): 50-55.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd