Secure Access Schemes in Mobile Database Systems
暂无分享,去创建一个
[1] Ehud Gudes. The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.
[2] Arie Shoshani,et al. A Compression Technique for Large Statistical Data-Bases , 1981, VLDB.
[3] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[4] Dennis G. Severance,et al. A practitioner's guide to data base compression - Tutorial , 1983, Inf. Syst..
[5] Gordon V. Cormack,et al. Data compression on a database system , 1985, CACM.
[6] Mostafa A. Bassiouni,et al. Data Compression in Scientific and Statistical Databases , 1985, IEEE Transactions on Software Engineering.
[7] Mark A. Roth,et al. Database compression , 1993, SGMD.
[8] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[9] Shojiro Nishio,et al. Strategies for Query Processing in Mobile Computing , 1994, Mobidata.
[10] A. Prasad Sistla,et al. Data replication for mobile computers , 1994, SIGMOD '94.
[11] Tomasz Imielinski,et al. Sleepers and workaholics: caching strategies in mobile environments , 1994, SIGMOD '94.
[12] Tomasz Imielinski,et al. Mobile wireless computing: challenges in data management , 1994, CACM.
[13] Min-Shiang Hwang,et al. Conference key distribution protocols for digital mobile communication systems , 1995 .
[14] Ahmed K. Elmagarmid,et al. Wireless client/server computing for personal information services and applications , 1995, SGMD.
[15] Li Gong,et al. Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.
[16] Wei-Pang Yang,et al. A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..
[17] Abdelsalam Helal,et al. Mobile computing and databases: anything new? , 1995, SGMD.
[18] Joseph E. Wilkes,et al. Privacy and authentication needs of PCS , 1995, IEEE Wirel. Commun..
[19] Bharat Bhargava,et al. A framework for providing consistent and recoverable agent-based access to heterogeneous mobile databases , 1995, SGMD.
[20] Lin Lin,et al. Security in enterprise networking: A quick tour , 1996 .
[21] Arkady Zaslavsky,et al. Database replica management strategies in multidatabase systems with mobile hosts , 1996 .
[22] Min-Shiang Hwang,et al. Authenticated key-exchange in a mobile radio network , 1997, Eur. Trans. Telecommun..
[23] Chinya V. Ravishankar,et al. Block-Oriented Compression Techniques for Large Statistical Databases , 1997, IEEE Trans. Knowl. Data Eng..
[24] Wei-Pang Yang,et al. Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.
[25] Min-Shiang Hwang. Dynamic participation in a secure conference scheme for mobile communications , 1999 .