Reverse Encryption Algorithm: A Technique for Encryption & Decryption
暂无分享,去创建一个
[1] Mohey M. Hadhoud,et al. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..
[2] K. M. S. Soyjaudah,et al. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..
[3] Huy Hoang Ngo,et al. Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..
[4] Sushil Jajodia,et al. Implementation of a Storage Mechanism for Untrusted DBMSs , 2003, Second IEEE International Security in Storage Workshop.
[5] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[6] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[7] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[8] Sehun Kim,et al. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..
[9] Hiroyuki Kitagawa,et al. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..
[10] Sushil Jajodia,et al. Metadata Management in Outsourced Encrypted Databases , 2005, Secure Data Management.
[11] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[12] Min Wang,et al. Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.
[13] Dongyao Ji,et al. Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..
[14] Yuefei Zhu,et al. New Efficient Searchable Encryption Schemes from Bilinear Pairings , 2010, Int. J. Netw. Secur..
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[16] J. P. Raina,et al. Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .
[17] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[18] Bruce Schneier,et al. Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .