A database encryption system with subkeys
暂无分享,去创建一个
[1] David L. Wells,et al. Database Security , 1978, IEEE Transactions on Software Engineering.
[2] Donald E. Knuth. The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .
[3] D. Wells. Achieving data base protection through the use of subkey encryption , 1980 .
[4] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[7] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[8] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[9] G. I. Davida,et al. Microprocessors And Data Encryption , 1979 .
[10] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[11] Naftaly H. Minsky. Intentional resolution of privacy protection in database systems , 1976, CACM.
[12] L. E. Dickson. Introduction to the theory of numbers , 1933 .
[13] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[14] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[15] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.