The Protection Strategy of Data Security Based on JAVA Stream Filtering

Article Preview

Abstract:

With the development of the computer network and communication technology, some important information is used to infringe upon by using the Internet and associated communications technology. The paper analyzes briefly the principle of the JAVA stream filtering and data security protection strategy on network of multi-level, then takes some safety measures for data protection by using the JAVA stream filter, mainly focuses on the network transmission of the socket data, in order to protect the security of data, and discussed some related problems of data encryption, finally gives the safety results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1631-1634

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen Ying, He Qingming. The Synthetic Research of Hypertext Intelligent Computer Assisted Instruction, Journal of Computer Research and Development, Vol. 35, No. 5 May. 1998, 65-89.

Google Scholar

[2] S. Saeednia, S. Kremer, O. Markowitch. An efficient strong designated verifier signature scheme. CICS 2003, LNCS 2971, Spring-Verlag, 2003, pp.40-53.

DOI: 10.1007/978-3-540-24691-6_4

Google Scholar

[3] B. Kang, C. Boyd, E. Dawson. Identity-based strong designated verifier signature scheme: Attacks and new construction, Computers and Electrical Engineering, 35(1), 2009, pp.49-55.

DOI: 10.1016/j.compeleceng.2008.05.004

Google Scholar

[4] Ying Fu, Feng Zhang. The Security Analysis of Java Programming. Computer and Digital Engineering, November, 2005, pp.76-79.

Google Scholar

[5] Jiangao Deng, Jiangbo Pan. The Web Database Security Research Based on Java Security System. Computer Engineering and Design. September , 2008, pp.101-105.

Google Scholar

[6] Maochun Li, Heshun Wang. JAVA WEB Encrypts User's Password with MD5 Algorithm. Computer and Information Technology, 2010(05), pp.133-137.

Google Scholar

[7] Yi Zhao. Internet SSL Programming and Java Implementation. Journal of Shanghai Engineering and Technology, 2005(03), pp.121-125.

Google Scholar

[8] Information on http: /www. oracle. com/technetwork/java/index. html.

Google Scholar