Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,974,655 papers from all fields of science
Search
Sign In
Create Free Account
Compound key
Known as:
Combination Primary Key
, Composite key
In database design, a compound key is a set of superkeys that is not minimal. A composite key is a set that contains a compound key and at least one…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Associative entity
Candidate key
Foreign key
Relational database
Expand
Broader (1)
Data modeling
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Beginning EJB in Java EE 8
Jonathan D. Wetherbee
,
Massimo Nardone
,
Chirag Rathod
,
R. Kodali
Apress
2018
Corpus ID: 44160584
Entity Class������������������������������������������������������������������������������������������������������������ 191…
Expand
2018
2018
A Composite key using Division Algorithm and Matrix Inversion in Symmetric Key Encryption
S. B. Patil
2018
Corpus ID: 86472235
2015
2015
Designing Securely and Reliably Connected Wireless Sensor Networks
Jun Zhao
,
Osman Yaugan
,
V. Gligor
arXiv.org
2015
Corpus ID: 17601864
In wireless sensor networks, the $q$-composite key predistribution scheme is a widely recognized way to secure communications…
Expand
2013
2013
An Efficient Security Way of Authentication and Pair wise Key Distribution with Mobile Sinks in Wireless Sensor Networks
Hongmei Deng
,
W. Li
,
D. Agrawal
,
R. Govindan
,
Radford R. Juang
2013
Corpus ID: 17689264
: Wireless sensor networks (WSN) are the emerging application in many industrial and missile sector. Mobile sinks (MSs) are vital…
Expand
2012
2012
Database Integrity Mechanism between OLTP and Offline Data
Muhammad Salman
,
N. Rehman
,
M. Shahid
Asian Conference on Intelligent Information and…
2012
Corpus ID: 14467987
This paper describes integrity mechanism between OLTPs and offline data. Normally every RDBMS supports five Integrity Constraints…
Expand
2010
2010
Cluster Based Composite Key Management in Mobile Ad Hoc Networks
J. Hubaux
,
L. Buttyán
,
+7 authors
Jingsha He
2010
Corpus ID: 61823220
Mobile ad hoc network is a wireless network without the support of network infrastructure. Security is one of the main challenge…
Expand
2009
2009
Design a secure composite key-management scheme in Ad-Hoc Networks using Localization
S. Ghoreishi
,
M. Analoui
2009
Corpus ID: 17782410
Summary A mobile Ad-Hoc network is a collection of wireless mobile nodes, dynamically forming a temporary network without the use…
Expand
2007
2007
Hash Crash and Beyond
Paul M. Dorfman
,
Lessia S. Shajenko
,
K. Vyverman
2007
Corpus ID: 62383112
In SAS® Version 9.1, the hash table - the very first object introduced via the DATA Step Component Interface in Version 9.0 - has…
Expand
2007
2007
Keyboard automatic test system and its method
张传国
,
李海荣
,
王昌浩
2007
Corpus ID: 196001226
The present invention provides a keyboard automatic test system and its method, the system includes a keyboard unit and a…
Expand
1996
1996
Dynamic optimization of index scans restricted by Booleans
G. Antoshenkov
Proceedings of the Twelfth International…
1996
Corpus ID: 8308420
When index retrieval is restricted to a range or singleton, an index scan is not done in its entirety because key portions before…
Expand