2011 IEEE 3rd International Conference on Communication Software and Networks 2011
DOI: 10.1109/iccsn.2011.6014819
|View full text |Cite
|
Sign up to set email alerts
|

Research on network database encryption technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology [9].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology [9].…”
Section: Literature Reviewmentioning
confidence: 99%
“…With the increasing popularity of the Internet and increasing awareness of privacy protection, encryption technology has been widely used in all aspects of daily life [1]. For example, people encrypt important files stored in their computers to prevent browsing and theft, use encryption technology to pre-process when transferring files through communication tools, or transfer important information through VPNs.…”
Section: Introductionmentioning
confidence: 99%