共 50 条
- [31] Homomorphic encryption with CCA security [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
- [32] Video encryption for security surveillance [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 207 - +
- [33] Security of signed ElGamal encryption [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 73 - 89
- [34] Database Security Using Encryption [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 353 - 358
- [35] Security Issues in NoSQL Databases [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 541 - 547
- [36] The security of databases: the Access case [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02): : 95 - 107
- [37] Security processor for bulk encryption [J]. 16TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS, PROCEEDINGS, 2004, : 446 - 449
- [38] Security Issues of Biometric Encryption [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 34 - 39
- [39] On the security of the WinRAR encryption method [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 402 - 416
- [40] Security of medical image databases [J]. MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 470 - 474