Study in Verification of encryption data table for storing and Broeding news

碩士 === 中國文化大學 === 資訊管理學系 === 98 === The data must keep security in the computer system. We collect all data (news) and broadcast them to all users. We avoid the data to be modified by attacker and broadcast the wrong message. We propose the method to collect the news and store them in computer syste...

Full description

Bibliographic Details
Main Authors: Chen-Shan-Kai, 陳宣凱
Other Authors: Lee Huey-Ming
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/58704951592953453049
id ndltd-TW-098PCCU0396032
record_format oai_dc
spelling ndltd-TW-098PCCU03960322017-03-23T04:35:52Z http://ndltd.ncl.edu.tw/handle/58704951592953453049 Study in Verification of encryption data table for storing and Broeding news 驗證加密表單應用於新聞儲存及播放之研究 Chen-Shan-Kai 陳宣凱 碩士 中國文化大學 資訊管理學系 98 The data must keep security in the computer system. We collect all data (news) and broadcast them to all users. We avoid the data to be modified by attacker and broadcast the wrong message. We propose the method to collect the news and store them in computer system in security. We encrypt the news and store the encrypted news in the encrypted news database. Before we want to broadcast, we decrypt the encrypted news. In this study, we set encryption data table and use it to encrypt the news file to encrypted news data. All news have different location code in the news information database. We use location code to insert encryption data table to encrypted news and store the encrypted news to encrypted news database. In this paper, we propose the method of verification to check the encrypted news is modified or not. When we install these algorithms in the computer system to process, it is more secure. Lee Huey-Ming Lee Tsang-Yean 李惠明 李長彥 2010 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中國文化大學 === 資訊管理學系 === 98 === The data must keep security in the computer system. We collect all data (news) and broadcast them to all users. We avoid the data to be modified by attacker and broadcast the wrong message. We propose the method to collect the news and store them in computer system in security. We encrypt the news and store the encrypted news in the encrypted news database. Before we want to broadcast, we decrypt the encrypted news. In this study, we set encryption data table and use it to encrypt the news file to encrypted news data. All news have different location code in the news information database. We use location code to insert encryption data table to encrypted news and store the encrypted news to encrypted news database. In this paper, we propose the method of verification to check the encrypted news is modified or not. When we install these algorithms in the computer system to process, it is more secure.
author2 Lee Huey-Ming
author_facet Lee Huey-Ming
Chen-Shan-Kai
陳宣凱
author Chen-Shan-Kai
陳宣凱
spellingShingle Chen-Shan-Kai
陳宣凱
Study in Verification of encryption data table for storing and Broeding news
author_sort Chen-Shan-Kai
title Study in Verification of encryption data table for storing and Broeding news
title_short Study in Verification of encryption data table for storing and Broeding news
title_full Study in Verification of encryption data table for storing and Broeding news
title_fullStr Study in Verification of encryption data table for storing and Broeding news
title_full_unstemmed Study in Verification of encryption data table for storing and Broeding news
title_sort study in verification of encryption data table for storing and broeding news
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/58704951592953453049
work_keys_str_mv AT chenshankai studyinverificationofencryptiondatatableforstoringandbroedingnews
AT chénxuānkǎi studyinverificationofencryptiondatatableforstoringandbroedingnews
AT chenshankai yànzhèngjiāmìbiǎodānyīngyòngyúxīnwénchǔcúnjíbōfàngzhīyánjiū
AT chénxuānkǎi yànzhèngjiāmìbiǎodānyīngyòngyúxīnwénchǔcúnjíbōfàngzhīyánjiū
_version_ 1718433572278239232