Skip to main content
placeholder image

Using Hierarchical Encryption to Protect Database Privacy

Conference Paper


Abstract


Publication Date


  • 2004

Citation


  • Kong, Y., Seberry, J. R., Getta, J. R. & Yu, P. (2004). Using Hierarchical Encryption to Protect Database Privacy. Australasian Workshop on Combinatorial Algorithms (pp. 260-269). Alexandria, Sydney, Australia: National Information and Communications Technology Australia.

Start Page


  • 260

End Page


  • 269

Place Of Publication


  • Alexandria, Sydney, Australia

Abstract


Publication Date


  • 2004

Citation


  • Kong, Y., Seberry, J. R., Getta, J. R. & Yu, P. (2004). Using Hierarchical Encryption to Protect Database Privacy. Australasian Workshop on Combinatorial Algorithms (pp. 260-269). Alexandria, Sydney, Australia: National Information and Communications Technology Australia.

Start Page


  • 260

End Page


  • 269

Place Of Publication


  • Alexandria, Sydney, Australia