共 50 条
- [31] A Method of Query over Encrypted Data in Database [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
- [32] THE KEY MANAGEMENT OF THE ENCRYPTED DATABASE BASED ON XML [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1919 - 1926
- [33] The database, the network and the digital community: the new dynamics of information processing [J]. ELECTRONIC LIBRARY, 1997, 15 (05): : 383 - 388
- [34] Fingerprint information database system based on image processing technology [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 250 - 254
- [35] Efficient key updates in encrypted database systems [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 1 - 15
- [36] A Survey on Querying Encrypted Data for Database as a Service [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
- [37] Efficient Parallel Summation on Encrypted Database System [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 178 - 185
- [38] Image search scheme over encrypted database [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 251 - 258
- [40] IMAGE ANALYSIS AND PROCESSING IN THE ENCRYPTED DOMAIN [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 3020 - 3022