RSA Based Key Compromised Resistant P rotocol(KCR) For Large Databases
暂无分享,去创建一个
[1] Gao Feng,et al. A cryptography index technology and method to measure information disclosure in the DAS model , 2009 .
[2] Bhavani M. Thuraisingham,et al. Multilevel Security in Database Management Systems , 1987, Comput. Secur..
[3] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[4] Dan Boneh,et al. Experimenting with Shared Generation of RSA Keys , 1999, NDSS.
[5] Wei-Pang Yang,et al. Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..
[6] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[7] Harshavardhan Kayarkar. Classification of Various Security Techniques in Databases and their Comparative Analysis , 2012, ArXiv.
[8] Meg Murray,et al. Database Security: What Students Need to Know , 2010, J. Inf. Technol. Educ. Innov. Pract..
[9] J. Grossschadl,et al. The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[10] James Arlin Cooper. Computer and communications security: strategies for the 1990s , 1989 .
[11] Sushil Jajodia,et al. Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure , 2006, 200614th IEEE International Workshop on Quality of Service.
[12] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[13] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .