{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:16:56Z","timestamp":1725520616753},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ccnc.2005.1405142","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T10:25:58Z","timestamp":1113301558000},"page":"49-53","source":"Crossref","is-referenced-by-count":6,"title":["A secure database encryption scheme"],"prefix":"10.1109","author":[{"given":"Zongkai Yang","family":"Samba Sesay","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security for Computer Networks","year":"1984","author":"davis","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/69.895801"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"journal-title":"Secure Computer Systems Mathematical Foundations and Mdel M74-244","year":"1973","author":"bell","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10011"},{"journal-title":"Cryptography A New Dimension in Computer Data Security","year":"1982","author":"carl","key":"6"},{"key":"5","article-title":"Field encryption and authentication","author":"denning","year":"1983","journal-title":"Proc of CRYPTO 8 9"},{"journal-title":"\"Cryptography and Network Security Principles and Practice\" 2nd Ed","year":"1999","author":"stallings","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer Systems Unified Exposition and iWtics Interpretation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319580"},{"key":"12","first-page":"507","article-title":"A kernel design for a secure data base management system","author":"downs","year":"1977","journal-title":"Proc Int Conf On Very Large Data Bases"}],"event":{"name":"Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005","location":"Las Vegas, NV, USA"},"container-title":["Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9640\/30469\/01405142.pdf?arnumber=1405142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T08:18:31Z","timestamp":1549873111000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1405142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2005.1405142","relation":{},"subject":[]}}