2020
DOI: 10.1109/tcomm.2020.3015500
|View full text |Cite
|
Sign up to set email alerts
|

Binary Code Optimized for Partial Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…Database encryption is to use the existing database encryption technology to study how to encrypt and decrypt the data in the database, so as to improve the security of the database system [7]. Generally speaking, the security control measures provided by the database system can meet the application of general databases, but for the application of some important departments or sensitive fields, such as financial data, military data, and state secrets, naturally including university archives database, only these are difficult to fully ensure the security of data [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Database encryption is to use the existing database encryption technology to study how to encrypt and decrypt the data in the database, so as to improve the security of the database system [7]. Generally speaking, the security control measures provided by the database system can meet the application of general databases, but for the application of some important departments or sensitive fields, such as financial data, military data, and state secrets, naturally including university archives database, only these are difficult to fully ensure the security of data [8].…”
Section: Literature Reviewmentioning
confidence: 99%