On the Application of Data Encryption Technology in Computer Network Information Security Protection
DOI:
https://doi.org/10.53469/ijomsr.2025.08(04).09Keywords:
Data encryption technology, Computer, Network information security, Practical applicationAbstract
With the advent of the information age, computer networks are becoming increasingly developed, and computer technology and network technology are widely used in various industries. How to ensure the security of computer network information has also become a hot topic of discussion in today's society. Password leakage, account security, and browsing information privacy have caused a lot of trouble when using computers due to the lack of information security protection. In order to ensure the security of information stored in computer networks, more and more network hosts are adopting data encryption technology in computer networks to ensure the security of information. This is a common information technology that mainly enhances the security level of computer network information by encrypting information data. In this article, we will provide a detailed introduction to the specific applications of data encryption technology in safeguarding computer network security information, such as software, business, and network data, as well as the issues that need to be noted during the application process. We will analyze and explore these applications to enhance the effectiveness of data encryption technology in information security.
References
Yang, J. (2025). Application of LightGBM in the Chinese Stock Market.
Song, X. (2024). Leveraging aigc and human-computer interaction design to enhance efficiency and quality in e-commerce content generation.
Wu, W. (2024). Research on cloud infrastructure for large-scale parallel computing in genetic disease.
Chen, J. (2025). Geospatial Neural Networks: Enhancing Smart City through Location Intelligence.
Wang, H. (2024). The Restriction and Balance of Prior Rights on the Right of Enterprise Name.
Lin, Y., Liu, J., Cao, Y., Cao, Y., & Wang, Z. (2025). Transfer learning-enhanced modelling of annular aperture arrays and nanohole arrays. Physica Scripta, 100(3), 036003.
Gong, C., Lin, Y., Cao, J., & Wang, J. (2024, October). Research on Enterprise Risk Decision Support System Optimization based on Ensemble Machine Learning. In Proceeding of the 2024 5th International Conference on Computer Science and Management Technology (pp. 1003-1007).
Peng, Q., Zheng, C., & Chen, C. (2024). A Dual-Augmentor Framework for Domain Generalization in 3D Human Pose Estimation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2240-2249).
Peng, Q., Planche, B., Gao, Z., Zheng, M., Choudhuri, A., Chen, T., ... & Wu, Z. (2024). 3d vision-language gaussian splatting. arXiv preprint arXiv:2410.07577.
Deng, T., Bi, S., & Xiao, J. (2025). Transformer-Based Financial Fraud Detection with Cloud-Optimized Real-Time Streaming. arXiv preprint arXiv:2501.19267.
Zhou, Y., Wang, Z., Zheng, S., Zhou, L., Dai, L., Luo, H., ... & Sui, M. (2024). Optimization of automated garbage recognition model based on resnet-50 and weakly supervised cnn for sustainable urban development. Alexandria Engineering Journal, 108, 415-427.
Lyu, T., Gu, D., Chen, P., Jiang, Y., Zhang, Z., Pang, H., ... & Dong, Y. (2024). Optimized CNNs for Rapid 3D Point Cloud Object Recognition. arXiv preprint arXiv:2412.02855.
Wang, Y., & Liang, X. (2025). Application of Reinforcement Learning Methods Combining Graph Neural Networks and Self-Attention Mechanisms in Supply Chain Route Optimization. Sensors, 25(3), 955.
Zhao, S., Xu, Z., Zhu, Z., Liang, X., Zhang, Z., & Jiang, R. (2025). Short and Long-Term Renewable Electricity Demand Forecasting Based on CNN-Bi-GRU Model. IECE Transactions on Emerging Topics in Artificial Intelligence, 2(1), 1-15.
Liu, D., Wang, Z., & Liang, A. (2025). MiM-UNet: An efficient building image segmentation network integrating state space models. Alexandria Engineering Journal, 120, 648-656.