scholarly journals Research on Application of Packet Encryption Technology in Information Security Algorithm

2021 ◽  
Vol 2136 (1) ◽  
pp. 012044
Author(s):  
Yuxi Zhou ◽  
Mingjie Ma ◽  
Zenghui Jiang

Abstract As the focus of the development of the whole society in the era of big data, information security is also the main direction of the practice and development of technological innovation. On the basis of understanding the current information transmission security and its algorithm research, this paper analyzes how to use this technology to guarantee information security according to the block encryption principle.

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jian Xiao

Based on the unprecedented development of current information technology, under the prevalence of third-party payment, in order to increase the utilization rate of idle resources and meet the diversified economic needs of today’s era, as an emerging economic model-the “sharing economy”, combined with Internet big data, it has effectively realized the perfect connection between supply and demand, and it has quickly swept through all walks of life. However, while promoting economic development, the lack of regulatory measures and the imperfect credit system have severely restricted the further development of the sharing economy. Blockchain technology (BT), as a new distributed infrastructure and computing method, has always been the core technology of Bitcoin. Based on the development of generalized economic model and BT, this paper analyzes the shortcomings of generalized economic model and blockchain technology through information fusion big data and proposes a kind of information based on information fusion big data+public BT. The security management system adapts to the status quo of the sharing economy and uses the functions of information fusion big data+blockchain technology to solve the current information security risks faced by the sharing economy. The experimental results of this article show that the sharing economy information security management system based on information fusion big data+blockchain technology has good protection capabilities. The interception rate of external information reached 95%, and the interception rate of system information reached 93%. Better protection of privacy leaks is needed.


1998 ◽  
Vol 4 (5-6) ◽  
pp. 62-66
Author(s):  
I.D. Gorbenko ◽  
◽  
Yu.V. Stasev ◽  
A.V. Pot ◽  
A.M. Tkachev ◽  
...  

Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed. The tendencies in the legal regulation of information security that took place at the initial stage of the formation of information legislation are revealed. Based on the factors that took place before the adoption of the Doctrine of information security of Ukraine, the laws of Ukraine “On the basic principles of ensuring the cybersecurity of Ukraine”, “On the national security of Ukraine”, in the context of the current legislation, based on the methodology of legal forecasting, it is concluded that in the future the development of normative legal information security will be developed on the basis of by-laws, mainly at the departmental level.


2005 ◽  
Vol 34 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Khin Than Win

The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.


2018 ◽  
Vol 10 (11) ◽  
pp. 4201 ◽  
Author(s):  
Xiao Dai ◽  
Jian Wu ◽  
Liang Yan

In China, with the deepening of the reform of industrial structures, the improvement of technological innovation has become a key issue. This is not only related to whether the strategic development of Chinese science and technology can be achieved, but also whether the Chinese economy and high-quality human capital can develop sustainably. Based on the theoretical boundary of sustainable development—free transfer of information—we see that sticky wages are the embodiment of information dissemination. Under the dual effects of profit-seeking behavior and information barriers, the relationship between the sticky wages of technological innovation talents (TIT), as the most profitable labor force, and technological innovation efficiency (TIE) has become more complex, and so far we still have a limited understanding of it. We explore this issue in an empirical study by using a two-stage chain Data Envelopment Analysis (DEA) of TIE followed by modifying the wages of TIT; finally, we build a collaborative evolution model with spatial effects on a large dataset (from 2007 to 2016). The results show that the overall Chinese TIE is relatively low, and in the central and western regions the TIE has been seriously reversed; there are also divergences in the TIE at different stages in the regions we focus on. As the output of technological innovation, except for initial results (such as patents), the more important value is whether it has an ability to transform the initial results into production, and the core of it is whether it can match the market environment and technology transfer system (for example, market mechanism, transformation incentive mechanism, and institutional mechanism). So, considering these aspects, the central and west of China are obviously insufficient, while the east has obvious advantages; this can also explain the results of spatial diffusion, namely, in the eastern region it is higher than in other areas, but the gap between them is gradually narrowing; lastly, from the perspective of synergy, the wage stickiness of TIT in the central region is larger than that of the eastern and western regions, and the evolutionary relationship in the former is “extruding” while in the latter it is “cooperative.” Mainly due to the popularity of the eastern innovation network and the initial state of the west, the barriers of information transmission are relatively low, while the central part is undergoing economic transformation, so its extreme demand for TIT has pushed up the cost of information transmission.


Sign in / Sign up

Export Citation Format

Share Document