Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 5
Page No. 1186 - 1191

An Enhanced Encryption Algorithm for Database Protection Based on Dynamic Key and Reverse String

Authors : Waleed Khalid Ahmed, Muamer N. Mohammed and Norrozila Sulaiman

References

Arai, K., S. Kapoor and R. Bhatia, 2014. Intelligent System in Science and Information. Springer, Berlin, Germany, ISBN:978-3-319-14653-9, Pages: 414.

Kester, Q.A., 2012. A cryptosystem based on Vigenere cipher with varying key. Intl. J. Adv. Res. Comput. Eng. Technol., 1: 108-113.
Direct Link  |  

Kester, Q.A., 2013. A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. Intl. J. Adv. Technol. Eng. Res., 3: 141-147.
Direct Link  |  

Khalaf, E.T., N. Sulaiman and M.N. Mohammad, 2013. Anti-forensic steganography method based on randomization. Global J. Technol., 4: 447-453.
Direct Link  |  

Mousa, A., O.S. Faragallah, E.S. Rabaie and E.M. Nigm, 2013. Security analysis of reverse encryption algorithm for databases. Intl. J. Comput. Appl., 66: 19-27.
CrossRef  |  PubMed  |  Direct Link  |  

Naji, M.A., 2014. Implementation of encryption data table by using multi-keys. Intl. J. Soft Comput. Eng., 4: 14-17.
Direct Link  |  

Ramaraj, E., 2012. A novel encryption approach in database security. Intl. J. Comput. Organ. Trends, 2: 16-20.
Direct Link  |  

Schneider, F.B., 2000. Enforceable security policies. ACM Trans. Inform. Syst. Secur., 3: 30-50.
Direct Link  |  

Sharma, R., R. Sharma and H. Singh, 2012. Classical encryption techniques. Intl. J. Comput. Technol., 3: 84-90.
Direct Link  |  

Stallings, W., 2005. Cryptography and Network Security Principles and Practices. 4th Edn., Prentice Hall, USA.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved