{"id":"https://openalex.org/W2118608006","doi":"https://doi.org/10.1109/ccnc.2005.1405142","title":"A secure database encryption scheme","display_name":"A secure database encryption scheme","publication_year":2005,"publication_date":"2005-04-12","ids":{"openalex":"https://openalex.org/W2118608006","doi":"https://doi.org/10.1109/ccnc.2005.1405142","mag":"2118608006"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2005.1405142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2005.1405142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5097458763","display_name":"Zongkai Yang Samba Sesay","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zongkai Yang Samba Sesay","raw_affiliation_strings":["Dept. of Telecommun. & Inf. Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Telecommun. & Inf. Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5097458763"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":2.1938,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.89263452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7972351312637329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7635473012924194},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.7090545296669006},{"id":"https://openalex.org/keywords/database-security","display_name":"Database security","score":0.6277865171432495},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5371613502502441},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5093177556991577},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.49877381324768066},{"id":"https://openalex.org/keywords/database-testing","display_name":"Database testing","score":0.4972405731678009},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4869502782821655},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44130006432533264},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4257271885871887},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.39624613523483276},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3943745195865631},{"id":"https://openalex.org/keywords/view","display_name":"View","score":0.2934907078742981},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09804394841194153}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7972351312637329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7635473012924194},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.7090545296669006},{"id":"https://openalex.org/C2778553114","wikidata":"https://www.wikidata.org/wiki/Q1035293","display_name":"Database security","level":2,"score":0.6277865171432495},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5371613502502441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5093177556991577},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.49877381324768066},{"id":"https://openalex.org/C78161392","wikidata":"https://www.wikidata.org/wiki/Q5227414","display_name":"Database testing","level":4,"score":0.4972405731678009},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4869502782821655},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44130006432533264},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4257271885871887},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.39624613523483276},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3943745195865631},{"id":"https://openalex.org/C54239708","wikidata":"https://www.wikidata.org/wiki/Q1329910","display_name":"View","level":3,"score":0.2934907078742981},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09804394841194153},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc.2005.1405142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2005.1405142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1570229259","https://openalex.org/W1991895580","https://openalex.org/W1997862012","https://openalex.org/W2005571213","https://openalex.org/W2007999111","https://openalex.org/W2036781120","https://openalex.org/W2109627855","https://openalex.org/W2150010995","https://openalex.org/W2164799985","https://openalex.org/W2317768079","https://openalex.org/W2320115120","https://openalex.org/W6634150125","https://openalex.org/W6676527459"],"related_works":["https://openalex.org/W1025240641","https://openalex.org/W2380438667","https://openalex.org/W2361619969","https://openalex.org/W4309584611","https://openalex.org/W4379801595","https://openalex.org/W2243208492","https://openalex.org/W2393921427","https://openalex.org/W4308784203","https://openalex.org/W2372014581","https://openalex.org/W2357912106"],"abstract_inverted_index":{"The":[0],"need":[1],"to":[2,29,50],"protect":[3],"the":[4,31,54,73,76,96],"database":[5,16,46,60,69,77,87],"is":[6,39],"growing":[7],"especially":[8],"in":[9,41,45],"this":[10,58,83],"age":[11],"of":[12,37,68,75,100],"e-commerce.":[13],"Many":[14],"conventional":[15],"security":[17,38],"systems":[18],"are":[19,47],"bugged":[20],"with":[21],"holes":[22],"that":[23,90],"can":[24],"be":[25],"used":[26],"by":[27,57],"attackers":[28],"penetrate":[30],"database.":[32],"No":[33],"matter":[34],"what":[35],"degree":[36],"put":[40],"place,":[42],"sensitive":[43],"data":[44],"still":[48],"vulnerable":[49],"attack.":[51],"To":[52],"avoid":[53],"risk":[55],"posed":[56],"threat,":[59],"encryption":[61,88,101],"has":[62],"been":[63],"recommended.":[64],"However":[65],"encrypting":[66],"all":[67],"item":[70],"greatly":[71],"degrades":[72],"performance":[74],"system.":[78],"As":[79],"an":[80],"optimal":[81],"solution":[82],"paper":[84],"presents":[85],"a":[86],"scheme":[89],"provides":[91],"maximum":[92],"security,":[93],"whilst":[94],"limiting":[95],"added":[97],"time":[98],"cost":[99],"and":[102],"decryption.":[103]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
