Implementing cryptography in database
With the increasing dependency of database for data storage, many sensitive data such as personal information data and credit card information data are being stored inside a database. These data is so valuable that it attracts unauthorized personnel to gain access for obtaining the data for furth...
| Main Author: | Kwan, Shong Hann |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/2615/ http://umpir.ump.edu.my/id/eprint/2615/1/KWAN_SHONG_HANN.PDF |
Similar Items
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
CCS 523 - COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Bibliometric analysis on simultaneous saccharification and fermentation using ISI web of science database
by: Norazaliza, Mohd Jamil, et al.
by: Norazaliza, Mohd Jamil, et al.
An XML-based middleware interface integrating with heterogeneous relational databases / Kum Lee Ching.
by: Kum, Lee Ching
Published: (2003)
by: Kum, Lee Ching
Published: (2003)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
by: Tan, Syh Yuan
Published: (2014)
by: Tan, Syh Yuan
Published: (2014)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Magnetic resonance image search database system using active shape modeling technique / by Jayanthy Maniam.
by: Maniam, Jayanthy
Published: (2002)
by: Maniam, Jayanthy
Published: (2002)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Service Level Agreement-Based Migration For Database-As-A-Service In The Cloud
by: Wong, Jik Soon
Published: (2015)
by: Wong, Jik Soon
Published: (2015)
A Model for Evaluation of Cryptography Algorithm on UUM Portal
by: Norliana, Abdul Majid
Published: (2004)
by: Norliana, Abdul Majid
Published: (2004)
CSC 535 � CRYPTOGRAPHY FEB 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)
by: Amran, Salleh
Published: (2005)
Incorporating genetic algorithm into simulated annealing based redistricting
by: Sim, Kwan Hua.
Published: (2002)
by: Sim, Kwan Hua.
Published: (2002)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Implementing of ahs for process monitoring evaluation system
by: Fatin Syazwana, Hashim
Published: (2014)
by: Fatin Syazwana, Hashim
Published: (2014)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
Digital implementation of artificial neural networks / Saffith Faycal
by: Faycal, Saffith
Published: (1998)
by: Faycal, Saffith
Published: (1998)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Implementation of ump course registration system using heuristic method
by: Wong, Wei Leong
Published: (2012)
by: Wong, Wei Leong
Published: (2012)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
Similar Items
-
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017) -
Practical cryptography: algorithms and implementations using C++
Published: (2014) -
CCS 523 - COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)