First Page | Document Content | |
---|---|---|
![]() Date: 2009-11-27 08:33:14Cryptography Cloud computing Key management Public-key cryptography Cloud computing security Computer security Encryption Symmetric-key algorithm Key Disk encryption Database encryption | Add to Reading List |
![]() | Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.DocID: 1qF0A - View Document |
![]() | Microsoft PowerPoint - NPROM-zhang.pptxDocID: 1pGwl - View Document |
![]() | Microsoft Word - Arkansas FY 2009 FTRDocID: 1pxnt - View Document |
![]() | Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak GargDocID: 1pbA9 - View Document |
![]() | Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docxDocID: 1o0dS - View Document |