Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,849,497 papers from all fields of science
Search
Sign In
Create Free Account
Database encryption
Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (1)
Cryptography
Encryption
Encryption software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Study of Access Control for Electronic Health Records
S. Senese
2015
Corpus ID: 166637559
Highly Cited
2013
Highly Cited
2013
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture
Kawser Wazed Nafi
,
Tonny Shekha Kar
,
Sayed Anisul Hoque
,
M. Hashem
arXiv.org
2013
Corpus ID: 1722177
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the…
Expand
2012
2012
A Secure Scheme of Key Management for Database Encryption
Xiao-han Sun
2012
Corpus ID: 61306962
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and…
Expand
2010
2010
A new hardware-assisted PIR with O(n) shuffle cost
Xuhua Ding
,
Yanjiang Yang
,
R. Deng
,
Shuhong Wang
International Journal of Information Security
2010
Corpus ID: 4852177
Since the concept of private information retrieval (PIR) was first formalized by Chor et al., various constructions have been…
Expand
2009
2009
Iris biometric authentication based on local global graphs: An FPGA implementation
R. Kannavara
,
N. Bourbakis
IEEE Symposium on Computational Intelligence for…
2009
Corpus ID: 16832835
In this work, we present a Local-Global (LG) graph methodology for iris based biometric authentication. Local-Global (LG) graph…
Expand
2009
2009
Database Encryption System Based on Metadata
Gu Lei
2009
Corpus ID: 64479422
Encryption is a very effective way to enforce data security,because the database is special in it's structure,so the security key…
Expand
2008
2008
A new lightweight database encryption scheme transparent to applications
Lianzhong Liu
,
Jingfen Gai
6th IEEE International Conference on Industrial…
2008
Corpus ID: 11327530
Database encryption, as a mechanism for active security enhancement, is a crucial technique to protect data confidentiality. Two…
Expand
2007
2007
RESEARCH AND IMPLEMENTATION OF DATABASE ENCRYPTION SYSTEM
Liu Ming-kun
2007
Corpus ID: 63269974
An effective method to realize database information security is to use middleware.The design integrates the identity verification…
Expand
2007
2007
The Design and Implementation of Database Encryption
N. Arshad
,
Saharbudin Naim Tahir Shah
,
A. Mohamed
,
Abdul Manaf Mamat
2007
Corpus ID: 61415397
Information inside the database is shared by multiple parties such as internal users, partners, contractors and others. Sensitive…
Expand
2007
2007
Database Encryption Scheme for Enhanced Security and Easy Sharing
Zhu Jing-bo
2007
Corpus ID: 64328135
Inspired by the PGP technique,a novel database encryption scheme was proposed for enhanced data sharing inside a database,while…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE