A secure database encryption scheme
暂无分享,去创建一个
Zongkai Yang | Du Xu | S. Sesay | Jingwen Chen | Zongkai Yang | S. Sesay | Jing-Wen Chen | Du Xu
[1] " Cryptography : A New Dimension in Computer Data , 2022 .
[2] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[3] Stephen M. Matyas,et al. Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .
[4] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[7] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[8] Dorothy E. Denning,et al. Field Encryption and Authentication , 1983, CRYPTO.
[9] Dorothy E. Denning. Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.