An Improved Fine-Grained Encryption Method for Unstructured Big Data
暂无分享,去创建一个
[1] Sameer Singh,et al. Advances in Pattern Recognition — ICAPR 2001 , 2001, Lecture Notes in Computer Science.
[2] Nei Kato,et al. Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.
[3] Mikko Kiviharju. Towards Pervasive Cryptographic Access Control Models , 2012, SECRYPT.
[4] Shiau-Huey Wang,et al. An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks , 2013, J. Comput..
[5] Mustafa M. Matalgah,et al. Simple encryption algorithm with improved performance in wireless communications , 2011, 2011 IEEE Radio and Wireless Symposium.
[6] Gail-Joon Ahn,et al. Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[7] S. El-Rabaie,et al. Encryption-based multilevel model for DBMS , 2012, Comput. Secur..
[8] Xing Zhou,et al. A novel efficient database encryption scheme , 2012, FSKD.
[9] Jiu-Ru Wang,et al. A research of fine-grained encryption method for IoT , 2012 .
[10] Mark Weiser. The computer for the 21st century , 1991 .
[11] L. M. Varalakshmi,et al. An enhanced encryption algorithm for video based on multiple Huffman tables , 2011, Multimedia Tools and Applications.
[12] John Lee,et al. A survey and challenges in routing and data dissemination in vehicular ad-hoc networks , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.
[13] Jennifer Widom,et al. Object exchange across heterogeneous information sources , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[14] Wang Yi-ming. Design of Lightweight Encryption Algorithm Based on Optimized S-box , 2010 .
[15] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[16] Zhou Yuping,et al. Research and realization of multi-level encryption method for database , 2010, 2010 2nd International Conference on Advanced Computer Control.
[17] Matthew Smith,et al. Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.