Database encrytpion/decryption using AES and DES
The application of database on storing data of computer applications is nowadays very common. Whether the system is a simple or a complex one, the security of the data should be remain important if the systems do deal with private and confidential data. Security countermeasures need to be taken in b...
| Auteur principal: | Sufi, Abdulkadir Abukar |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2014
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/48009/25/AbdulkadirAbukarSufiMFC2014.pdf |
Documents similaires
Advanced encryption standard (AES) coprocessor
par: Lim, Joo Song
Publié: (2014)
par: Lim, Joo Song
Publié: (2014)
Algorithm to prevent and detect insider multi transaction malicious activity in database
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
Database encrytpion
par: Abukar Sufi, Abdul Kadir
Publié: (2014)
par: Abukar Sufi, Abdul Kadir
Publié: (2014)
Reconstruction of Binary Image Using Techniques of Discrete Tomography
par: Isawasan, Pradeep
Publié: (2012)
par: Isawasan, Pradeep
Publié: (2012)
Design an interactive learning model: using persuasive technology to learn children Arabic alphabets
par: Abusafia, Alaa H.
Publié: (2013)
par: Abusafia, Alaa H.
Publié: (2013)
Condition monitoring on surge arrester using improvised Metal Oxide Surge Arrester Intelligent Monitoring System
par: Ramanathan, Haribalan
Publié: (2014)
par: Ramanathan, Haribalan
Publié: (2014)
Dual modality tomography system using optical nd capacititve sensors for solid gas flow measurement
par: Mohd. Zain, Rasif
Publié: (2009)
par: Mohd. Zain, Rasif
Publié: (2009)
Voltage SAG mitigation by optimizing the location of distributed generation using genetic algorithm for three distributed generation types
par: Abdrabou Ahmed, Ahmed Mohamed
Publié: (2014)
par: Abdrabou Ahmed, Ahmed Mohamed
Publié: (2014)
Improved connectivity in geographic routing protocols using delay-tolerant networks scheme in vehicular ad hoc networks
par: Karimi, Ramin
Publié: (2013)
par: Karimi, Ramin
Publié: (2013)
Object tracking from unmanned aerial vehicle using Kanade-Lucas-Tomasi tracker and speeded up robust features
par: Rahim, Falah Jabar
Publié: (2015)
par: Rahim, Falah Jabar
Publié: (2015)
Fingerprint Template Security: A Proposed Framework for Enhancing Fingerprint Authentication System Using Fragile Image Watermarking Technique
par: Iman Hazwam, Abd. Halim
Publié: (2007)
par: Iman Hazwam, Abd. Halim
Publié: (2007)
Score Fusion Using Hybrid Bacterial Foraging Optimization And Particle Swarm Optimization (Bfo-Pso) For Hand-Based Multimodal Biometrics
par: Shanmugasundaram, Karthikeyan
Publié: (2020)
par: Shanmugasundaram, Karthikeyan
Publié: (2020)
Optimal tuning of controller parameters for a magnetic levitation system using radial basis based neural network metamodeling approach
par: Mohammad Abdalhadi, Abdualrhman Daw
Publié: (2021)
par: Mohammad Abdalhadi, Abdualrhman Daw
Publié: (2021)
Modelling And Analysis Of Stacked-Chip Scale Packages (S-Csps) Encapsulation Process Using Finite Difference Method [TK7874. K46 2007 f rb].
par: Abdullah, Muhammad Khalil
Publié: (2006)
par: Abdullah, Muhammad Khalil
Publié: (2006)
A framework for the implementation of computer based testing for Saudi Arabia secondary schools
par: Hakami, Yahya Abduh A.
Publié: (2014)
par: Hakami, Yahya Abduh A.
Publié: (2014)
Integrating social customer relationship management into customer relationship management processes in academic library
par: Alilou, Farima
Publié: (2014)
par: Alilou, Farima
Publié: (2014)
Vision-based customer counting for shopping lots
par: Lee, Fang Soong
Publié: (2014)
par: Lee, Fang Soong
Publié: (2014)
Arbitration schemes of wishbone on chip bus system
par: Ong, Kok Tong
Publié: (2014)
par: Ong, Kok Tong
Publié: (2014)
A new feature extraction algorithm for overlapping leaves of rubber tree
par: Anjomshoae, Sule
Publié: (2014)
par: Anjomshoae, Sule
Publié: (2014)
Knowledge sharing practices and tool in a logistic company
par: Mohd. Rahim, Noor Irliana
Publié: (2014)
par: Mohd. Rahim, Noor Irliana
Publié: (2014)
Redefining histograms of oriented gradients descriptors for handling occlusion in people detection
par: Sani, Ahmad
Publié: (2014)
par: Sani, Ahmad
Publié: (2014)
An energy efficient acknowledgement-based method for selfish node detection and avoidance in open MANET
par: Nikmaram, Mehrnaz
Publié: (2014)
par: Nikmaram, Mehrnaz
Publié: (2014)
Software development for the evaluation of the lightning protection system design
par: Ramalingam, Raveen Kumar
Publié: (2014)
par: Ramalingam, Raveen Kumar
Publié: (2014)
Hardware-accelerated localization for automated license plate recognition system
par: Chin, Teck Loong
Publié: (2014)
par: Chin, Teck Loong
Publié: (2014)
Hardware and software co-simulation platform for convolution or correlation based image processing algorithms
par: Ayat, Sayed Omid
Publié: (2014)
par: Ayat, Sayed Omid
Publié: (2014)
Optimization of piezoelectric energy harvesting system
Publié: (2014)
Publié: (2014)
Pattern and frequency reconfigurable antenna for wireless applications
par: Abijuru, Delphine
Publié: (2014)
par: Abijuru, Delphine
Publié: (2014)
TCP Sintok: Transmission control protocol with delay-based loss detection and contention avoidance mechanisms for mobile ad hoc networks
par: Habbal, Adib
Publié: (2014)
par: Habbal, Adib
Publié: (2014)
Pembangunan Suatu Model Antaramuka Kebolehkendalian-Antara Untuk Kad Pintar Di Dalam Kampus Universiti [TK7895.S62 K45 2008 f rb].
par: Hamdi, Khairul Anwar Kamaruddin
Publié: (2008)
par: Hamdi, Khairul Anwar Kamaruddin
Publié: (2008)
Clustering approach based on feature weighting for recommendation system in movie domain
par: Nabizadeh Rafsanjani, Amir Hossein
Publié: (2013)
par: Nabizadeh Rafsanjani, Amir Hossein
Publié: (2013)
Secure on-demand routing protocol in wireless sensor networks based on route weight and knowledge sharing
par: Farrokhtala, Ali
Publié: (2013)
par: Farrokhtala, Ali
Publié: (2013)
Integrated fare payment system in multi operators single market public bus network
par: Mokhtar, Safizahanin
Publié: (2011)
par: Mokhtar, Safizahanin
Publié: (2011)
Aplikasi koordinasi modular dalam sistem bantuan rekabentuk berkomputer
par: Sulaiman, Muhammad Khairi
Publié: (2010)
par: Sulaiman, Muhammad Khairi
Publié: (2010)
An alternative ranking scheme for computational grid resource selection
par: Seraydashti, Mehran Ranjbar
Publié: (2013)
par: Seraydashti, Mehran Ranjbar
Publié: (2013)
Pembangunan aplikasi permainan strategi untuk latihan penyelesaian masalah (snake defense)
par: Salim, Muhammad Fadzley
Publié: (2013)
par: Salim, Muhammad Fadzley
Publié: (2013)
Fasa kesediaan digital forensik bagi Kerajaan Negeri Johor
par: Jaffar, Ruzana
Publié: (2013)
par: Jaffar, Ruzana
Publié: (2013)
Cloud computing adoption in banking system (UTM) in terms of customers perspectives
par: Asadi, Shahla
Publié: (2013)
par: Asadi, Shahla
Publié: (2013)
Evaluation of machine learning techniques for imbalanced data in IDS
par: Mokaramian, Shahram
Publié: (2013)
par: Mokaramian, Shahram
Publié: (2013)
Pembangunan aplikasi cepat membaca al-Quran untuk platform android (Mai IQra)
par: Jusoh, Yanti Munirah
Publié: (2013)
par: Jusoh, Yanti Munirah
Publié: (2013)
Efficiency key generation management in a big organization for symmetric cryptography system
par: Mirzaee, Atefeh
Publié: (2013)
par: Mirzaee, Atefeh
Publié: (2013)
Documents similaires
-
Advanced encryption standard (AES) coprocessor
par: Lim, Joo Song
Publié: (2014) -
Algorithm to prevent and detect insider multi transaction malicious activity in database
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013) -
Database encrytpion
par: Abukar Sufi, Abdul Kadir
Publié: (2014) -
Reconstruction of Binary Image Using Techniques of Discrete Tomography
par: Isawasan, Pradeep
Publié: (2012) -
Design an interactive learning model: using persuasive technology to learn children Arabic alphabets
par: Abusafia, Alaa H.
Publié: (2013)