Cryptographic applications in database security : a survey study /
57
Main Authors: | , , , , |
---|---|
Format: | |
Language: | eng |
Published: |
Skudai : Universiti Teknologi Malaysia,
2002
|
Subjects: |
_version_ | 1796693424677584896 |
---|---|
author | Zailani Mohamed Sidek, Assoc.Prof.Dr. Piper, Fred Norbik Bashah Idris Ciechanowicz, Zbigniew 'Chez' International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar) |
author_facet | Zailani Mohamed Sidek, Assoc.Prof.Dr. Piper, Fred Norbik Bashah Idris Ciechanowicz, Zbigniew 'Chez' International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar) |
author_sort | Zailani Mohamed Sidek, Assoc.Prof.Dr. |
collection | OCEAN |
description | 57 |
first_indexed | 2024-03-05T00:22:50Z |
format | |
id | KOHA-OAI-TEST:237762 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T00:22:50Z |
publishDate | 2002 |
publisher | Skudai : Universiti Teknologi Malaysia, |
record_format | dspace |
spelling | KOHA-OAI-TEST:2377622020-12-19T17:07:15ZCryptographic applications in database security : a survey study / Zailani Mohamed Sidek, Assoc.Prof.Dr. Piper, Fred Norbik Bashah Idris Ciechanowicz, Zbigniew 'Chez' International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar) Skudai : Universiti Teknologi Malaysia,2002eng575859PSZJBLComputer securityCryptographyDatabase securityInternet |
spellingShingle | Computer security Cryptography Database security Internet Zailani Mohamed Sidek, Assoc.Prof.Dr. Piper, Fred Norbik Bashah Idris Ciechanowicz, Zbigniew 'Chez' International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar) Cryptographic applications in database security : a survey study / |
title | Cryptographic applications in database security : a survey study / |
title_full | Cryptographic applications in database security : a survey study / |
title_fullStr | Cryptographic applications in database security : a survey study / |
title_full_unstemmed | Cryptographic applications in database security : a survey study / |
title_short | Cryptographic applications in database security : a survey study / |
title_sort | cryptographic applications in database security a survey study |
topic | Computer security Cryptography Database security Internet |
work_keys_str_mv | AT zailanimohamedsidekassocprofdr cryptographicapplicationsindatabasesecurityasurveystudy AT piperfred cryptographicapplicationsindatabasesecurityasurveystudy AT norbikbashahidris cryptographicapplicationsindatabasesecurityasurveystudy AT ciechanowiczzbigniewchez cryptographicapplicationsindatabasesecurityasurveystudy AT internationalarabconferenceoninformationtechnology2002universityofqatardohaqatar cryptographicapplicationsindatabasesecurityasurveystudy |