Computer Science ›› 2005, Vol. 32 ›› Issue (11): 127-129.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: This paper puts forward that combining the packet filtering technology of firewall with symmetrical encryption algorithm and asymmetry encryption algorithm of data encryption, and by combination the chain to encrypt with the end-to-end enerypfion to achie

Key words: Network database, Database security, Firewa11, Data encryption, Identification, Digital signature

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!