[1] Shmueli E, Vaisenberg R. Database Encryption——An Overview of Contemporary Challenges and Design Considerations[J]. SIGMOD Record, 2009, 38(3): 29-34. [2] Deshmukh A P, Qureshi R. Transparent Data Encryption——Solution for Security of Database Contents[J]. International Journal of Advanced Computer Science and Applications, 2011, 2(3): 25-28. [3] Duan Guoding. An Efficient Data Encrypting Approach Based on DBMS Kernel[J]. Software Engineering and Knowledge Engineering: Theory and Practice, 2012, 114: 1081-1088. [4] 冯朝胜, 秦志光, 袁 丁. 数据库加密系统密钥管理模块的设计[J]. 电子科技大学学报, 2007, 36(5): 830-833. [5] 房国志, 刘焕武. 一种混合密码体制的数据库加密技术研究[J]. 哈尔滨理工大学学报, 2008, 13(5): 33-36. [6] Lu Bouganim, Guo Yanli. Database Encryption[C]//Proc. of Conference on Encyclopedia of Cryptography and Security. [S. l.]: Springer-Verlag, 2009: 1-9. [7] Wang Xiaoming, Yao Guoxiang, Zhang Zhen. An Encryption Scheme with Hidden Keyword Search for Outsourced Database[J]. Journal of Networks, 2011, 6(12): 1697-1704. [8] Agrawal R, Kieman J, Srikant R. Research of the Database Encryption Technique Based on Hybrid Cryptography[C]// Proc. of 2010 International Symposium on Computational Intelligence and Design. Hangzhou, China: [s. n.], 2010. [9] 北京安华金和科技有限公司. 安华金和数据库保险箱系统——DBCOffer产品简介[EB/OL]. (2011-09-04). http:// www.schina.cn/uploads/soft/110919/1-110919224T8. pdf. [10] 李胜金, 张昌宏, 周大伟. 一种基于ECDH的可认证密钥协商协议[J]. 信息安全与通信保密, 2011, (7): 70-72. [11] Lederer C, Mader R, Koschuch M. Energy-efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks[J]. Lecture Notes in Computer Science, 2009, 5746: 112-127. (下转第179页) [12] 刘连浩, 温从剑. AES的差分-代数攻击[J]. 计算机工程与应用, 2010, 46(5): 111-113. [13] Dunkelman O, Keler N, Shamir A. Improved Single-key Attacks on 8-round AES[EB/OL]. (2010-05-31). http:// eprint.iacr.org/2010/322. [14] 董晓丽, 胡予濮, 陈 杰, 等. 7轮AES-128的非对称不可能飞来器攻击[J]. 计算机学报, 2011, 34(7): 1300-1307. [15] Sangwan C, Bhardwaj C, Nisha N, et al. VLSI Implementation of Advanced Encryption Standard[C]// Proc. of the 2nd International Conference on Advanced Computing & Communication Technologies. Rohtak, India: [s. n.], 2012. [16] Muda Z, Mahmod R, Sulong M R. Key Transformation Approach for Rijndael Security[J]. Information Technology Journal, 2010, 9(2): 290-297. [17] 庞辽军, 裴庆祺, 李慧贤. 信息安全工程[M]. 西安: 西安电子科技大学出版社, 2010. [18] 朱贵良, 秦小立, 张晓强. 基于离散分数余弦变换的图像加密算法研究[J]. 计算机应用研究, 2011, 28(11): 4338-4330. [19] 朱贵良, 朱宏飞, 张晓强. Logistic映射敏感值的有限精度研究[J]. 计算机应用研究, 2012, 29(2): 664-666. [20] Zhu Congxu. A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences[J]. Optics Communi- cations, 2012, 285(1): 29-37. [21] Sul Seungjin. Classification-based Automatic Fingerprint Identification System for Large Distributed Fingerprint Database[J]. Journal of Biometrics & Biostatistics, 2011, 2(2): 1-4. 编辑 张 帆
|