Database encrytion schemes : a comparative study /
57
Main Authors: | , , , |
---|---|
格式: | |
语言: | eng |
出版: |
Skudai : Universiti Teknologi Malaysia,
2002
|
主题: |
_version_ | 1826408640137920512 |
---|---|
author | Zailani Mohamed Sidek, Assoc.Prof.Dr. Norbik Bashah Idris Harihodin Selamat Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur) |
author_facet | Zailani Mohamed Sidek, Assoc.Prof.Dr. Norbik Bashah Idris Harihodin Selamat Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur) |
author_sort | Zailani Mohamed Sidek, Assoc.Prof.Dr. |
collection | OCEAN |
description | 57 |
first_indexed | 2024-03-05T01:33:43Z |
format | |
id | KOHA-OAI-TEST:261437 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T01:33:43Z |
publishDate | 2002 |
publisher | Skudai : Universiti Teknologi Malaysia, |
record_format | dspace |
spelling | KOHA-OAI-TEST:2614372020-12-19T17:08:17ZDatabase encrytion schemes : a comparative study / Zailani Mohamed Sidek, Assoc.Prof.Dr. Norbik Bashah Idris Harihodin Selamat Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur) Skudai : Universiti Teknologi Malaysia,2002eng575859PSZJBLComputer securityData encryption (Computer science)ComputersCryptographyData protection |
spellingShingle | Computer security Data encryption (Computer science) Computers Cryptography Data protection Zailani Mohamed Sidek, Assoc.Prof.Dr. Norbik Bashah Idris Harihodin Selamat Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur) Database encrytion schemes : a comparative study / |
title | Database encrytion schemes : a comparative study / |
title_full | Database encrytion schemes : a comparative study / |
title_fullStr | Database encrytion schemes : a comparative study / |
title_full_unstemmed | Database encrytion schemes : a comparative study / |
title_short | Database encrytion schemes : a comparative study / |
title_sort | database encrytion schemes a comparative study |
topic | Computer security Data encryption (Computer science) Computers Cryptography Data protection |
work_keys_str_mv | AT zailanimohamedsidekassocprofdr databaseencrytionschemesacomparativestudy AT norbikbashahidris databaseencrytionschemesacomparativestudy AT harihodinselamat databaseencrytionschemesacomparativestudy AT conferenceoninformationtechnologyresearchandapplications2002unitarkualalumpur databaseencrytionschemesacomparativestudy |