Skip to main content

The Information Encryption Design and Application of the Aquatic Product Tracing Process

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9567))

Included in the following conference series:

  • 1499 Accesses

Abstract

In recent years, aquatic product quality and safety problems occur frequently make aquatic product traceability is increasingly important, and the problems of data security exposure in the tracing process also must be resolved. In this paper, the research object is based on the system of aquatic product traceability system, and two kinds of encryption technology (symmetric encryption and asymmetric encryption technology) has been introduced. After considering the features of the information in the tracing process and the advantages and disadvantages of the two encryption technologies, three specific data encryption scheme in the three major data processing of aquatic product traceability have been designed. And the encryption scheme has been programmed to realize, which is proved to be feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Y.: Analysis of application of data encryption technology in computer security. Inf. Commun. 02, 160–161 (2012)

    Google Scholar 

  2. Jiang, W.: Brief comments on the principle and application of information encryption technology. Comput. Era 05, 10–11 (2011)

    Google Scholar 

  3. Zhuo, X., Zhao, F., Zeng, D.: Study on asymmetric encryption technology. J. Sichuan Univ. Sci. Eng. (Nat. Sci. Ed.) 05, 562–564 (2010)

    Google Scholar 

  4. Rabah, K.: Theory and implementation of data encryption standard: a review. Inf. Technol. J. 44, 210–211 (2010)

    Google Scholar 

  5. Penchalaiah, N., Seshadri, R.: Effective comparison and evaluation of DES and Rijndael Algorithm (AES). Int. J. Comput. Sci. Eng. 25, 88–89 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lian Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zu, Q., Liu, L. (2016). The Information Encryption Design and Application of the Aquatic Product Tracing Process. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31854-7_85

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31853-0

  • Online ISBN: 978-3-319-31854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics