FIELD ENCRYPTION AND AUTHENTICATION Dorothy E. Denning1

14 downloads 2750 Views 641KB Size Report
Database encryption and authentication at the field level is attractive because it ... Consider a file of N records where each record has M fields. The objective is to ...