The application of information security encryption technology in military data system management

4Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Followed by the continuous growing of computer technology and computer network technology, the data formation and management were used the previously complicated method. But the data management had a common issue, which became completely relied on computer network technology. Additionally, because of the significant specificity of military data, the security of data management became a main issue that needs to be solved. Therefore, more study carried out on the security management of military data systems may provide significant practical understanding and direction on manipulating and managing the military electronic file data systems securely and accurately. This paper covered all the disadvantages and security risks of controlling the military file data system via computer network technology currently. Moreover, the paper focused on the practical application of the information security encryption technology in managing the military file data. This paper may provide a further step on protecting the security of military data and promoting progress of computer scientific knowledge.

Cite

CITATION STYLE

APA

Zheng, X. (2018). The application of information security encryption technology in military data system management. In Lecture Notes in Electrical Engineering (Vol. 456, pp. 423–428). Springer Verlag. https://doi.org/10.1007/978-981-10-6232-2_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free