KEYWORDS: Databases, Computer security, Data storage, Security technologies, Information security, Information technology, Network security, Algorithm development, Defense and security, Software development
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the
important role played by the message encryption techniques in database security, As well as MD5 encryption technology
principle and the use in the field of website or application. This article is divided into introduction, the overview of the
MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements
and application, this paper makes readers more detailed and clearly understood the principle, the importance in database
security, and the use of MD5 encryption technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.