咨询与建议

限定检索结果

文献类型

  • 38 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 46 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 12 篇 信息与通信工程
    • 9 篇 软件工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 3 篇 控制科学与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 环境科学与工程(可...
  • 14 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 3 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 59 篇 database encrypt...
  • 7 篇 database outsour...
  • 6 篇 key management
  • 6 篇 cloud computing
  • 5 篇 order-preserving...
  • 4 篇 data privacy
  • 4 篇 encrypted index ...
  • 3 篇 database securit...
  • 3 篇 outsourcing comp...
  • 3 篇 order-revealing ...
  • 3 篇 information secu...
  • 3 篇 security
  • 3 篇 cryptography
  • 2 篇 cloud database
  • 2 篇 relational datab...
  • 2 篇 secure index
  • 2 篇 query efficiency
  • 2 篇 query
  • 2 篇 aes algorithm
  • 2 篇 order preserving...

机构

  • 3 篇 chonbuk natl uni...
  • 2 篇 elect & telecomm...
  • 2 篇 jeonbuk natl uni...
  • 2 篇 csiro ict ctr ma...
  • 1 篇 rose hulman inst...
  • 1 篇 hallym univ comp...
  • 1 篇 microsoft res re...
  • 1 篇 georgetown univ ...
  • 1 篇 miami univ dept ...
  • 1 篇 school of comput...
  • 1 篇 peoples armed po...
  • 1 篇 zhejiang univ co...
  • 1 篇 kyushu univ dept...
  • 1 篇 swiss fed inst t...
  • 1 篇 calif state univ...
  • 1 篇 univ sci vnu hcm...
  • 1 篇 kongju natl univ...
  • 1 篇 chonbuk natl uni...
  • 1 篇 mohammed v univ ...
  • 1 篇 ben gurion univ ...

作者

  • 6 篇 chang jae-woo
  • 5 篇 kim hyeong-il
  • 5 篇 kim hyeong-jin
  • 3 篇 kim kee sung
  • 2 篇 hue t. b. p.
  • 2 篇 jho nam-su
  • 2 篇 kim hyoungshick
  • 2 篇 echizen i.
  • 2 篇 choi jusop
  • 2 篇 thuc d. n.
  • 2 篇 wohlgemuth s.
  • 2 篇 wang shenlu
  • 2 篇 liu dongxi
  • 2 篇 thuy t. b. d.
  • 1 篇 grigore elena mi...
  • 1 篇 li yanqiu
  • 1 篇 huang qi-chun
  • 1 篇 deshpande varad
  • 1 篇 kharmoum nassim
  • 1 篇 李现伟

语言

  • 54 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"主题词=database encryption"
59 条 记 录,以下是1-10 订阅
排序:
database encryption - An Overview of Contemporary Challenges and Design Considerations
收藏 引用
SIGMOD RECORD 2009年 第3期38卷 29-34页
作者: Shmueli, Erez Vaisenberg, Ronen Elovici, Yuval Glezer, Chanan Ben Gurion Univ Negev Deutsch Telekom Labs IL-84105 Beer Sheva Israel Ben Gurion Univ Negev Dept Informat Syst Engn IL-84105 Beer Sheva Israel Univ Calif Irvine Sch Comp Sci Irvine CA USA
This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security, encryption overhea... 详细信息
来源: 评论
database encryption Implementation and Analysis using Graphics Processing Unit
Database Encryption Implementation and Analysis using Graphi...
收藏 引用
3rd FTRA International Conference on Mobile, Ubiquitous and Intelligent Computing (MUSIC) / 1st International Workshop on Integrated Enabling Technologies (IET)
作者: Jeun, Inkyung Jung, Hyun-Chul Lee, Nan Ki Won, Dongho Korea Internet and Security Agency South Korea Penta Security System Inc. South Korea Sungkyunkwan University South Korea
Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed... 详细信息
来源: 评论
A Generic Scheme of plaintext-checkable database encryption
收藏 引用
INFORMATION SCIENCES 2018年 429卷 88-101页
作者: Ma, Sha Mu, Yi Susilo, Willy South China Agr Univ Coll Math & Informat Guangzhou 510640 Guangdong Peoples R China Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia
database encryption is essential for cloud database systems. For a large database, decryption could take a lot of computational time. Therefore, verifying an encryption that contains a correct plaintext without decryp... 详细信息
来源: 评论
Research of database encryption Based on Fast AES Algorithm Implementation
Research of Database Encryption Based on Fast AES Algorithm ...
收藏 引用
International Conference on Advances in Computer Science, Environment, Ecoinformatics, and Education
作者: Li, Nan Peoples Armed Police Force Acad China Informat Engn Teaching & Res Sect Langfang Hebei 065000 Peoples R China
At present, there are many research achievements in the field of block cipher. Especially, the AES (Advanced encryption Standard) algorithm should be considered the excellent representative of all the researches. When... 详细信息
来源: 评论
THE RESEARCH AND APPLICATION OF EMBEDDED database encryption METHOD  12
THE RESEARCH AND APPLICATION OF EMBEDDED DATABASE ENCRYPTION...
收藏 引用
12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
作者: Hu, Lei Li, Jian-Ping Yang, Le-Wei Yang, Yujun Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Huaihua Univ Sch Comp Sci & Engn Huaihua 418008 Peoples R China Hunan Prov Key Lab Ecol Agr Intelligent Control T Huaihua 418008 Peoples R China
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of pro... 详细信息
来源: 评论
Embedded Network database encryption System Optimization Considering the B/S Structure and Software Optimization  5
Embedded Network Database Encryption System Optimization Con...
收藏 引用
5th International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Ma, Qinmin Shenzhen Polytech Sch Artificial Intelligence Shenzhen 518055 Guangdong Peoples R China
With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information... 详细信息
来源: 评论
Efficient database encryption Scheme for database-as-a-Service Environment
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第5期9卷 195-203页
作者: Joo, Hankyu Hallym Univ Comp Engn Chunchon South Korea
Computing-as-a-service is gaining ground. Clients may use the service without purchasing the system supporting the service. database-as-a-Service (DBaaS) is an important area of computing-as-a-service. DBaaS allows cl... 详细信息
来源: 评论
A Secure Scheme of Key Management for database encryption
A Secure Scheme of Key Management for Database Encryption
收藏 引用
2011 2nd Asia-Pacific Conference on Wearable Computing Systems
作者: Xiao-han Sun Department of Computer Science Weinan Teachers University
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and administered by the creators who create the secret data. Anyone who makes a request on ... 详细信息
来源: 评论
THE RESEARCH AND APPLICATION OF EMBEDDED database encryption METHOD
THE RESEARCH AND APPLICATION OF EMBEDDED DATABASE ENCRYPTION...
收藏 引用
International Copmputer Conference on Wavelet Active Miedia Technology and Information Processing
作者: LEI HU JIAN-PING LI LE-WEI YANG YUJUN YANG School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of pro... 详细信息
来源: 评论
Design of encryption System for Urban Cultural Heritage Protection database Based on Blockchain Technology  5th
Design of Encryption System for Urban Cultural Heritage Prot...
收藏 引用
5th EAI International Conference on Advanced Hybrid Information Processing (ADHIP)
作者: Peng, Cai-ting Zhang, He-qing Feng, Yi-lin Guangzhou Univ Management Tourism Sch Guangzhou 510006 Peoples R China
Aiming at the problems of long data encryption time and low encryption efficiency in the traditional urban cultural heritage protection database encryption system, an urban cultural heritage protection database encryp... 详细信息
来源: 评论