Sciweavers

2386 search results - page 129 / 478
» Database Security 2000
Sort
View
IADIS
2003
14 years 11 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Provably Secure Partially Blind Signatures
Partially blind signature schemes are an extension of blind signature schemes that allow a signer to explicitly include necessary information (expiration date, collateral condition...
Masayuki Abe, Tatsuaki Okamoto
GCC
2003
Springer
15 years 3 months ago
Preserving Data Consistency in Grid Databases with Multiple Transactions
High performance Grid computing provides an infrastructure for access and processing of large volume, terabyte or even petabytes, of distributed data. Research in data grid has foc...
Sushant Goel, Hema Sharda, David Taniar
DBSEC
2007
89views Database» more  DBSEC 2007»
14 years 11 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
ISSE
2008
14 years 11 months ago
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
David Hernando, David Gómez, Javier Rodr&ia...