Database encryption

Results: 73



#Item
31Relational database / Daewoo Precision Industries K2 / Tuple / Tiny Encryption Algorithm / Computing / Data / Mathematics / Relational model / K1

Microsoft Word - sigmod038-markowetz.doc

Add to Reading List

Source URL: www.iai.uni-bonn.de

Language: English - Date: 2007-03-10 05:32:06
32Computing / Software / Database management systems / Relational database management systems / Cryptography / Transparent Data Encryption / Vormetric / Filesystem-level encryption / Data security / Disk encryption / Cryptographic software / Data management

White Paper Debunking The Myths of Column-level Encryption Debunking The Myths of Column-level

Add to Reading List

Source URL: cybersec.fi

Language: English - Date: 2012-10-07 15:21:18
33Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
34Computer security / Security / Computing / Encryption software / Encryption / Backup / Vormetric / Transparent Data Encryption / Cryptographic software / Disk encryption / Cryptography

Database TDE Most/All Sensitive File Encryption Existing

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2015-02-25 15:15:07
35Cyberwarfare / McAfee / Data loss prevention software / USB flash drive / Database activity monitoring / Disk encryption / Threat / Encryption / Database / Computer security / Computer network security / Security

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
36Secure multi-party computation / Database / Computing / Data / Information / Deterministic encryption / Cryptography / Homomorphic encryption / Cloud computing

Secure Computation on Encrypted Database Faculty Seminar, MayProfessor David Wai-lok CHEUNG Head, Department of Computer Science

Add to Reading List

Source URL: engg.hku.hk

Language: English - Date: 2009-06-26 21:59:31
37Oracle Database / Oracle Corporation / Transparent Data Encryption / Oracle E-Business Suite / Oracle RAC / Oracle Fusion Middleware / Software / Computing / Cross-platform software

Oracle Database 2 Day + Security Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-02-08 22:19:44
38Cryptography / Relational database management systems / Cryptographic software / Alexander Kornbrust / Database management systems / Oracle Corporation / Oracle Database / Encryption software / Database / Data management / Software / Computing

Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Add to Reading List

Source URL: www.red-database-security.com

Language: English - Date: 2009-05-07 08:02:06
39Computing / Transparent Data Encryption / Cross-platform software / Message authentication codes / Oracle Corporation / Oracle Database / HMAC / Vormetric / Cryptography standards / Cryptography / Software / Disk encryption

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
40Information / Content-addressable storage / Backup / Information Lifecycle Management / Computer data storage / Email archiving / File system / Database / Enterprise content management / Computing / Information technology management / Data security

• Media Independence: In addition to disk, Assureon supports offline media such as tape and optical allowing user’s to benefit not only from the high level of security provided by the encryption on their tapes, but a

Add to Reading List

Source URL: www.abcsystems.ch

Language: English - Date: 2008-10-09 08:32:55
UPDATE