Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases

Faculty Science Year: 2013
Type of Publication: ZU Hosted Pages:
Authors:
Journal: The International Arab Journal of Information Technology السعودية Volume: 10
Keywords : Evaluating , Performance , Reverse Encryption Algorithm (REA)    
Abstract:
Database encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. It is a crucial technique
   
     
 
       

Author Related Publications

  • Elsayed Mahsoub Ahmed Nigm, "On the continuation of the limit distribution of intermediate order statistics under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Limit theorems for random maximum of independent and non-identically distributed random vectors", ألمانيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Asymptotic Distributions of the Generalized and the Dual Generalized Extremal Quotient", ماليزيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Extreme value modeling under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Security Analysis of Reverse Encryption Algorithm for Databases", أمريكا, 2013 More

Department Related Publications

  • Rodyna Ahmed Mahmoud, "Proximity structures and grill", ijser, 2013 More
  • Heba Ibrahim Mustafa, "On rough approximations via ideal", Elsevier, 2013 More
  • Heba Ibrahim Mustafa, "Soft Generalized Closed Sets with Respect to an Ideal in Soft Topological Spaces", Natural science publishing USA, 2014 More
  • Heba Ibrahim Mustafa, "Hybridizing Rough Sets and Double Sets (An approach for increasing decision accuracy)", Acta Zhengzhou University Overseas, 2013 More
  • Alaa Hassan Attia Hassan, "On subordination results for certain new classes of analytic functions defined by using Salagean operator", Universiteti i Prishtines, Prishtine, Kosove, 2012 More
Tweet