Implementing cryptography in database
With the increasing dependency of database for data storage, many sensitive data such as personal information data and credit card information data are being stored inside a database. These data is so valuable that it attracts unauthorized personnel to gain access for obtaining the data for furth...
Saved in:
Main Author: | Kwan, Shong Hann |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/2615/1/KWAN_SHONG_HANN.PDF http://umpir.ump.edu.my/id/eprint/2615/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementation of cryptography algorithms in SCADAKratos application
by: Salleh, N., et al.
Published: (2016) -
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
A Model for Evaluation of Cryptography Algorithm on UUM Portal
by: Norliana, Abdul Majid
Published: (2004) -
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)