共 50 条
- [21] CryptDB: Processing Queries on an Encrypted Database [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (09) : 103 - 111
- [22] Security issues in querying encrypted data [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 325 - 337
- [23] Encrypted watermarks and Linux laptop security [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 27 - 38
- [24] Performance evaluation on encrypted - non encrypted database fields containing IoT data [J]. IDEAS '19: PROCEEDINGS OF THE 23RD INTERNATIONAL DATABASE APPLICATIONS & ENGINEERING SYMPOSIUM (IDEAS 2019), 2019, : 329 - 330
- [25] Computer Database Security Management Analysis and Discussion [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 54 - 57
- [26] On Security Notions for Verifiably Encrypted Signature [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 37 - 40
- [27] As an Example in SQL SERVER Database Security Analysis [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 438 - 442
- [28] Security analysis of civil registry database of Ecuador [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1024 - 1029
- [29] The Analysis of the Security Strategy of Embedded Mobile Database [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 476 - 478
- [30] Balancing Security and Usability in Encrypted Email [J]. IEEE INTERNET COMPUTING, 2017, 21 (03) : 30 - 38