Open AccessJournal Article
AES Encryption Algorithm Analysis and the Application in Information Security
Reads0
Chats0
TLDR
The development of AES encryption algorithm and realization process is introduced, and its application in information security is discussed.Abstract:
With modern password analysis level,chip processing power unceasing enhancement,the advanced encryption standard AES algorithm can be widely used in various fields.This paper introduces the development of AES encryption algorithm and realization process,and discusses its application in information security.read more
Citations
More filters
Journal ArticleDOI
PLC Protection System Based on Verification Separation
TL;DR: A PLC protection system combined with a monitor between a SCADA and a PLC and a physically separated monitoring station could still protect the PLC in the field and record the identity of the key command operator, which facilitates the tracing and forensics of malicious activities.
Book ChapterDOI
Research on Multiple Network Disk Storage
Dong Zhang,Yahui Lu,Xudong Li +2 more
TL;DR: An improved multi-cloud storage-based block erasure coding algorithm and a block-based erasure code-based coding method to ensure the security and reliability of data stored in the network disk are proposed.
Proceedings ArticleDOI
Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation
Xiaoming Wang,Ke Zhou,Congyun Wu +2 more
TL;DR: In this article, a safety reinforced terminal protection technology based on the USB interface has become a research hotspot, which not only realizes functions such as identity authentication and content encryption, but also meets the personalized needs of users' independent choices and improves the security and controllability of the entire secondary system.