Protection of Software Data Based on AES and HASH
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    From the two aspects of data storage and user identification, this paper provides a program to protect the software data. It uses symmetrical encryption AES to achieve the encryption storage of the sensitive information in the database; uses SHA512 and regedit to achieve the software identification, and supplies the achieving process in VB2008, thus the software data can be double protected.

    Reference
    Related
    Cited by
Get Citation

吕君可.基于AES 与HASH 的软件数据保护.计算机系统应用,2011,20(3):210-213

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 09,2010
  • Revised:August 22,2010
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063