Database technology is one of the most widely applied computer technologies, its security is becoming more and
more important. This paper introduced the database security, network database security level, studies the security
technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the
campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is
widely used as reference in many fields, particularly in management information system security and e-commerce.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.