Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases

Faculty Science Year: 2013
Type of Publication: ZU Hosted Pages:
Authors:
Journal: The International Arab Journal of Information Technology السعودية Volume: 10
Keywords : Evaluating , Performance , Reverse Encryption Algorithm (REA)    
Abstract:
Database encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. It is a crucial technique
   
     
 
       

Author Related Publications

  • Elsayed Mahsoub Ahmed Nigm, "On the continuation of the limit distribution of intermediate order statistics under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Limit theorems for random maximum of independent and non-identically distributed random vectors", ألمانيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Asymptotic Distributions of the Generalized and the Dual Generalized Extremal Quotient", ماليزيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Extreme value modeling under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Security Analysis of Reverse Encryption Algorithm for Databases", أمريكا, 2013 More

Department Related Publications

  • Wael Mohamed Khadr Salim, "a novel algorithm for source localization based on nonnegative matrix factroization using \alpha 'beta divergence in chochleagram", WSEAS, 2013 More
  • Mohamed El Sayed Ahmed Muhamed, "a novel algorithm for source localization based on nonnegative matrix factroization using \alpha 'beta divergence in chochleagram", WSEAS, 2013 More
  • Rodyna Ahmed Mahmoud, "Some methods for generating proximities by relations", .ijser, 2013 More
  • Heba Ibrahim Mustafa, "Soft proximity", World's Pioneer Iceland, 2013 More
  • Heba Ibrahim Mustafa, "On Interval-Valued Supra-Fuzzy Syntopogenous Structure", Hindawi Publishing Corporation, 2012 More
Tweet