2021
DOI: 10.1007/s12652-020-02819-w
|View full text |Cite
|
Sign up to set email alerts
|

Website information retrieval of web database based on symmetric encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Cryptographic features provide security on the server side, even aggressors can retrieve logs from the server where they are stored in an encrypted form so that attackers cannot collect the original logs. A novel chaos graph symmetric encryption calculation [24] is utilized to encode and unscramble web data set webpage data, with high sensitivity to the initial value of the chaotic system and digital signature verification to work on the security of web data set webpage data. This search really kills the constraints of conventional calculations and this cycle makes web database website information search more accurate and improves recall speed and precision speed.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptographic features provide security on the server side, even aggressors can retrieve logs from the server where they are stored in an encrypted form so that attackers cannot collect the original logs. A novel chaos graph symmetric encryption calculation [24] is utilized to encode and unscramble web data set webpage data, with high sensitivity to the initial value of the chaotic system and digital signature verification to work on the security of web data set webpage data. This search really kills the constraints of conventional calculations and this cycle makes web database website information search more accurate and improves recall speed and precision speed.…”
Section: Related Workmentioning
confidence: 99%
“…Starting from the insensitivity of some networks to data, they put forward the concept of data prestorage. However, this scheme actually uses a large number of servers and has high limitations [10]. This scheme assumes that the method of data insensitive and distributed storage of a large number of servers can only be applied to a specific network.…”
Section: Related Workmentioning
confidence: 99%
“…An S-box with high nonlinearity and low linear and differential probabilities is always favorable for a cryptosystem 18 . Therefore, the design of such components with good cryptographic properties plays a significant role in cryptographic applications 19 .Substitution permutation network (SPN) structures are commonly implemented in AES and Feistel types of networks, such as DES 20 . AES uses bijective components to assemble the system invertible, whereas the DES approach is not limited to bijectivity.…”
mentioning
confidence: 99%
“…An S-box with high nonlinearity and low linear and differential probabilities is always favorable for a cryptosystem 18 . Therefore, the design of such components with good cryptographic properties plays a significant role in cryptographic applications 19 .…”
mentioning
confidence: 99%