Cryptography and relational database management systems
暂无分享,去创建一个
Min Wang | He Jingmin | Min Wang | He Jingmin
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[5] Ward Rosenberry,et al. Understanding DCE , 1992 .
[6] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[7] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[8] Hugo Krawczyk,et al. The Shrinking Generator , 1994, CRYPTO.
[9] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] Alan O. Freier,et al. SSL Protocol Version 3.0 Internet Draft , 1996 .
[12] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[13] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[14] Kevin Loney,et al. Oracle8: The Complete Reference , 1997 .
[15] S. Garfinkel,et al. Web security & commerce , 1997 .
[16] Scott B. Guthery,et al. Smart Card Developer's Kit , 1998 .
[17] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[18] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.