Security Analysis of Reverse Encryption Algorithm for Databases

Faculty Science Year: 2013
Type of Publication: ZU Hosted Pages: 19-27
Authors:
Journal: International Journal of Computer Applications أمريكا Volume: 66
Keywords : Security Analysis , Reverse Encryption Algorithm , Databases    
Abstract:
Encryption provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent perfor
   
     
 
       

Author Related Publications

  • Elsayed Mahsoub Ahmed Nigm, "On the continuation of the limit distribution of intermediate order statistics under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Limit theorems for random maximum of independent and non-identically distributed random vectors", ألمانيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Asymptotic Distributions of the Generalized and the Dual Generalized Extremal Quotient", ماليزيا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Extreme value modeling under power normalization", أمريكا, 2013 More
  • Elsayed Mahsoub Ahmed Nigm, "Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases", السعودية, 2013 More

Department Related Publications

  • Yasser AbdelAziz Amer Tolba, "Nonlinear vibration and of the Duffing oscillator to parametric excitation with time delay feedback", امريكا, 2016 More
  • Roshdy Mohamed Farouk AbdulHameed, "Segmentation of microarray images using artificial neural network and Gabor wavelet", Portgal, 2016 More
  • Heba Ibrahim Mustafa, "On rough approximations via ideal", Elsevier, 2013 More
  • Heba Ibrahim Mustafa, "Soft Generalized Closed Sets with Respect to an Ideal in Soft Topological Spaces", Natural science publishing USA, 2014 More
  • Heba Ibrahim Mustafa, "Hybridizing Rough Sets and Double Sets (An approach for increasing decision accuracy)", Acta Zhengzhou University Overseas, 2013 More
Tweet