2017
DOI: 10.20943/01201705.1320
|View full text |Cite
|
Sign up to set email alerts
|

Secure Network using Secure Hash Algorithm-3 with Locking Protocol in Distributed Database System

Abstract: The two phase locking protocol provides controlled access to a data item and prevents data inconsistencies in the distributed database system. The hashing algorithm is used to calculate hash value for the requested data item and the generated hash value is used as a medium to secure the communication between server and client connected through a network. This paper presents a methodology which is used to secure network of a distributed database system while processing requests for data items from various users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 8 publications
(10 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?