Journal of Guangxi Normal University(Natural Science Edition) ›› 2011, Vol. 29 ›› Issue (3): 125-130.
Previous Articles Next Articles
HOU You-li, YANG Xiong
CLC Number:
[1] Erez Shmueli,Ronen Vaisenberg,Yuval Elovici,et al.Database encryption:an overview of contemporary challenges and design considerations[J].ACM SIGMOD Record,2010,38:29-34. [2] 孙萍萍.基于表字段的数据库加密服务器的设计与实现[J].计算机与现代化,2009,11(6):6-11. [3] 咸鹤群,凤登国.支持属性粒度数据库加密的查询重写算法[J].计算研究与发展,2008,45(8):1307-1314. [4] 蒙杨,卿斯汗,刘克龙.等级加密体制中的密钥管理研究[J].计算机工程,2001,12(8):1147-1153. [5] KüHN U.Analysis of adatabase and index encryption scheme-problems and fixes[M]//Lecture Notes in Computer Science:Vol 4165.Berlin:Springer,2006:146-159. [6] 冯朝胜,袁丁.一种基于剩余定理的密钥分配方案[J].计算机工程,2006,32(14):146-148. [7] 徐江峰,马瑶.一种基于动态密钥的数据库加密方案[J].微计算机信息,2009,25(12-3):27-29. [8] 安然,陈驰,徐震.数据库加密中间件的设计与实现[J].计算机工程与设计,2009,30(14):3261-3264. [9] DONG Chang-yu,RUSSELLO G,DULAY N.Shared and searchable encrypted data for untrusted servers[M]//Lecture Notes in Computer Science:Vol 5094.Berlin:Springer,2008:127-143. [10] üNAY O,GüNDEM T I.A survey on querying encrypted XML documents for databases as a service[J].ACM SIGMOD Record,2008,37:12-20. [11] HACGüMü H,LYER B,MEHROTRA S.Query optimization in encrypted database systems[J].Lecture Notes in Computer Science.2005,3453:43-55. |
[1] | ZHOU Yan-yan, FENG Jia-li. Algorithm of Digital Audio Watermarking Based on Qualitative Mapping [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(2): 200-204. |
|