Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,074,063 papers from all fields of science
Search
Sign In
Create Free Account
Database encryption
Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (1)
Cryptography
Encryption
Encryption software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Study of Access Control for Electronic Health Records
S. Senese
2015
Corpus ID: 166637559
2012
2012
A Secure Scheme of Key Management for Database Encryption
Xiao-han Sun
2012
Corpus ID: 61306962
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and…
Expand
2010
2010
The Technology of Database Encryption
Yong-Xia Zhao
Second International Conference on Multimedia and…
2010
Corpus ID: 44885586
Data encryption is an effective means of preventing the saetred of database during data storage and transmission. The idea of…
Expand
2009
2009
Iris biometric authentication based on local global graphs: An FPGA implementation
R. Kannavara
,
N. Bourbakis
IEEE Symposium on Computational Intelligence for…
2009
Corpus ID: 16832835
In this work, we present a Local-Global (LG) graph methodology for iris based biometric authentication. Local-Global (LG) graph…
Expand
2009
2009
Database Encryption System Based on Metadata
Gu Lei
2009
Corpus ID: 64479422
Encryption is a very effective way to enforce data security,because the database is special in it's structure,so the security key…
Expand
2008
2008
A new lightweight database encryption scheme transparent to applications
Lianzhong Liu
,
Jingfen Gai
6th IEEE International Conference on Industrial…
2008
Corpus ID: 11327530
Database encryption, as a mechanism for active security enhancement, is a crucial technique to protect data confidentiality. Two…
Expand
2007
2007
RESEARCH AND IMPLEMENTATION OF DATABASE ENCRYPTION SYSTEM
Liu Ming-kun
2007
Corpus ID: 63269974
An effective method to realize database information security is to use middleware.The design integrates the identity verification…
Expand
2007
2007
The Design and Implementation of Database Encryption
N. Arshad
,
Saharbudin Naim Tahir Shah
,
A. Mohamed
,
Abdul Manaf Mamat
2007
Corpus ID: 61415397
Information inside the database is shared by multiple parties such as internal users, partners, contractors and others. Sensitive…
Expand
2007
2007
Research and Comparison of Several Database Encryption Technologies
Ye Zhen
2007
Corpus ID: 57611438
With the development of database usage into economy and production of our daily life,the database security is more and more…
Expand
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE