z-logo
open-access-imgOpen Access
Analysis on the Role of Network Security Protocol in Computer Communication Technology
Author(s) -
Ding Xue-mei,
Meisong Li,
Yi Wei,
Yuan Lu
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1648/3/032137
Subject(s) - computer science , security service , security association , computer security , otway–rees protocol , computer security model , wide mouth frog protocol , protocol (science) , network access control , security information and event management , computer network , internet layer , cloud computing security , communications protocol , cryptographic protocol , internet security , encryption , authentication (law) , internet protocol suite , authentication protocol , information security , the internet , challenge handshake authentication protocol , cryptography , world wide web , cloud computing , alternative medicine , pathology , operating system , medicine
With the rapid development of Internet, network security protocol plays an increasingly important role, which will enhance the security and stability of computer communication. Network security protocol can control the application process of computer communication technology, which will improve the computing communication environment. Through security protocol, we can guarantee the security of computer communication technology. In CTC system, this paper analyzes the practical application of computer security protocol. Through security protocol, we can guarantee the practical application effect of computer communication technology, which will promote the strengthening of security protocol in the future. In practical work, the security protocol will transfer information and data through a variety of methods, such as key distribution, identity authentication, data encryption and so on. Firstly, this paper analyzes the common security protocols. Then, this paper analyzes the role of security protocol.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here