Database encryption

Results: 73



#Item
1Software / Computing / System software / Cloud computing / Database / Cloud database / Filesystem-level encryption / Cloud computing security / Distributed file system for cloud

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
2Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
3Distribution / Manufacturing / Supply chain management / Lean manufacturing / Marketing / Database / Inventory / Data Encryption Standard

Microsoft Word - Arkansas FY 2009 FTR

Add to Reading List

Source URL: datapreservation.usgs.gov

Language: English - Date: 2014-10-21 19:08:57
4Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
5Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
6Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
7Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
8Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
9Cryptography / Database / Key management / Cloud storage / Encryption / Database encryption / Cloud computing security

Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications Krishna P. N. Puttaswamy Christopher Kruegel

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-08-30 11:54:47
10Cryptography / Cloud computing / Key management / Public-key cryptography / Cloud computing security / Computer security / Encryption / Symmetric-key algorithm / Key / Disk encryption / Database encryption

Microsoft PowerPoint - Copy of slides.ppt

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:14
UPDATE