Education, Science, Technology, Innovation and Life
Open Access
Sign In

Application of Network Security Technology Based on Blockchain Technology

Download as PDF

DOI: 10.23977/jeis.2023.080201 | Downloads: 38 | Views: 581

Author(s)

Li Ke 1

Affiliation(s)

1 Shandong Rongyue Financial Holdings Co., Ltd, Jinan, Shandong, China

Corresponding Author

Li Ke

ABSTRACT

This paper discusses the potential value of blockchain technology in the application of network security technology. Firstly, the challenges and problems faced by the current network security technology are analyzed. Then, combined with the advantages of blockchain technology, the specific application scenarios of blockchain technology in network security technology application are put forward, including identity authentication, data tamper prevention, secure communication and so on. Finally, the existing problems and development direction of blockchain technology in the application of network security technology are discussed. This paper aims to provide new ideas and methods for the research of network security technology application field.

KEYWORDS

Blockchain technology; Network security technology; Application research

CITE THIS PAPER

Li Ke, Application of Network Security Technology Based on Blockchain Technology. Journal of Electronics and Information Science (2023) Vol. 8: 1-7. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2023.080201.

REFERENCES

[1] Zhang Sainan. Effective application of network security technology of blockchain technology [J]. Electronic Technology and Software Engineering, 2022, (21): 5-8.
[2] Zhou Zongping, Li Jun. Analysis on the Application of Blockchain in Network Security Technology [J]. China Informatization, 2020, (7):76-77.
[3] Chen Mingda. Analysis on the Function of Blockchain Technology in Network Security [J]. Network Security Technology and Application, 2022, (2):25-26.
[4] Wang Baolong. Application of Blockchain Technology in Network Security [J]. Network Security Technology and Application, 2022, (9):20-22.
[5] Wang Yajiao, Li Junhan. A Review of Network Information Management and Content Security Based on Blockchain [J]. Scientific and Technological Innovation and Application, 2021, (10):69-71.
[6] Chen Yuanhe. Application of Blockchain Technology in Network Security [J]. Electronic Technology and Software Engineering, 2021, (13):245-246. 

Downloads: 7785
Visits: 268354

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.