Application of Cryptography Technology Based on Network Information Security

Authors

  • Yunyu Cao School of IoT Engineering, Wuxi University 214105

DOI:

https://doi.org/10.53469/jtpms.2025.05(5).06

Keywords:

Cryptography technology, Network information security, Computer network

Abstract

The rapid progress of science and technology has promoted the increasingly serious challenges to Internet security, such as virus intrusion, hacker attacks and data leakage.In order to address these issues, the development and use of cryptography have emerged, whose functions include maintaining the stability of computer systems to prevent data counterfeiting or modification, while ensuring the confidentiality and integrity of data within the system.This article mainly elaborates on the importance of information security in the current society, and provides a detailed introduction to cryptographic technology, especially exploring the practical application of cryptographic technology in the field of network information security for reference by colleagues.

References

Diao, Su, et al. "Optimizing Bi-LSTM networks for improved lung cancer detection accuracy." PloS one 20.2 (2025): e0316136.

X. Li, L. Evans, and X. Zhang, “Interactive data exploration for smart city analytics: A user-centered perspective,” 01 2025.

Wang, J. (2025). Smart City Logistics: Leveraging AI for Last-Mile Delivery Efficiency.

Bohang, Li, et al. "Image steganalysis using active learning and hyperparameter optimization." Scientific Reports 15.1 (2025): 7340.

Zhao, H., Chen, Y., Dang, B., & Jian, X. (2024). Research on Steel Production Scheduling Optimization Based on Deep Learning.

Yang, W., Zhang, B., & Wang, J. (2025). Research on AI Economic Cycle Prediction Method Based on Big Data.

Xu, Haoran. "Sustainability Enhancement in Healthcare Facility Design: Structural and Functional Optimization Based on GCN." (2025).

Jiang, Gaozhe, et al. "Investment Advisory Robotics 2.0: Leveraging Deep Neural Networks for Personalized Financial Guidance." (2025).

Tu, T. (2025). Log2Learn: Intelligent Log Analysis for Real-Time Network Optimization.

Downloads

Published

2025-06-02

How to Cite

Cao, Y. (2025). Application of Cryptography Technology Based on Network Information Security. Journal of Theory and Practice of Management Science, 5(5), 30–33. https://doi.org/10.53469/jtpms.2025.05(5).06