Academic literature on the topic 'Transparent Data Encryption (TDE)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transparent Data Encryption (TDE).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transparent Data Encryption (TDE)"
Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.
Full textResearcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.
Full textBeley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.
Full textSirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.
Full textResearcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.
Full textSibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.
Full textKaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.
Full textAlohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.
Full textDissertations / Theses on the topic "Transparent Data Encryption (TDE)"
Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textJunior, Marcos Antonio Simplício. "Algoritmos de autenticação de mensagens para redes de sensores." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11082010-114456/.
Full text(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.
Find full textBooks on the topic "Transparent Data Encryption (TDE)"
Blinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Full textCypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.
Find full textAnderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.
Find full textAnderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.
Find full textAnderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Routledge, 2022.
Find full textAnderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.
Find full textBook chapters on the topic "Transparent Data Encryption (TDE)"
Gasser, Linus, and Imad Aad. "Disk, File and Database Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_33.
Full textColes, Michael, and Rodney Landrum. "Transparent Data Encryption." In Expert SQL Server 2008 Encryption. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7_6.
Full textMcGiffen, Matthew. "Introducing Transparent Data Encryption." In Pro Encryption in SQL Server 2022. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8664-7_2.
Full textBarać, Zoran, and Daniel Scott-Raynsford. "Configuring Transparent Data Encryption to Bring Your Own Key." In Azure SQL Hyperscale Revealed. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9225-9_6.
Full textChang, Chaowen, Shuai Wang, Yutong Wang, and PeiSheng Han. "Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks." In Cloud Computing and Big Data. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28430-9_28.
Full textTeijeiro, Lucía Gómez, and Thomas Maillart. "Trends in Open Source Software for Data Protection and Encryption Technologies." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_40.
Full textMajumdar, Subhabrata. "Standards for LLM Security." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_25.
Full textBlinn, Eric. "Managing TDE." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_4.
Full textBlinn, Eric. "Moving a TDE Enabled Database." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_5.
Full textMannan, Mamun Abdul. "Data Privacy in E-Commerce." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-9491-5.ch017.
Full textConference papers on the topic "Transparent Data Encryption (TDE)"
Ma, Junchao, Yu Tian, Yanchang Feng, et al. "ZTKA: A Zero-Trust Based Kernel Encryption Architecture for Transparent Data Protection." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033649.
Full textZhan, Wei, Bo Jin, Huan Xu, and Chenxi Dong. "Data Security Management Based on Transparent Encryption Policy." In 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2022. http://dx.doi.org/10.1109/icmnwc56175.2022.10032001.
Full textYang, Xuelin, Amber Sultan, Adnan Hajomer, Liuming Zhang, and Weisheng Hu. "Physical-Layer OFDM Data Encryption using Chaotic QAM Mapping." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840402.
Full textPang, Pengfei, Khaled Aourra, Yuan Xue, YuanZhang Li, and QuanXin Zhang. "A Transparent Encryption Scheme of Video Data for Android Devices." In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2017. http://dx.doi.org/10.1109/cse-euc.2017.163.
Full textHan Chen, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Physical-layer OFDM data encryption using chaotic ZCMT precoding matrix." In 2017 19th International Conference on Transparent Optical Networks (ICTON). IEEE, 2017. http://dx.doi.org/10.1109/icton.2017.8024916.
Full textGeng, Cong, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Multi-Fold Physical Layer Data Encryption Using Chaotic Frequency Hopping." In 2018 20th International Conference on Transparent Optical Networks (ICTON). IEEE, 2018. http://dx.doi.org/10.1109/icton.2018.8473904.
Full textNatarajan, K., and Vaheedbasha Shaik. "Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases." In 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE, 2020. http://dx.doi.org/10.1109/icrcicn50933.2020.9296168.
Full textLukaj, Valeria, Alessio Catalfamo, Francesco Martella, Maria Fazio, Massimo Villari, and Antonio Celesti. "A NoSQL DBMS Transparent Data Encryption Approach for Cloud/Edge Continuum." In 2023 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2023. http://dx.doi.org/10.1109/iscc58397.2023.10217933.
Full textRaddo, Thiago R., Simon Rommel, Victor Land, Chigo Okonkwo, and Idelfonso Tafur Monroy. "Quantum Data Encryption as a Service on Demand: Eindhoven QKD Network Testbed." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840238.
Full textHu, Ji, and Andreas Klein. "A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud." In 2009 International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2009. http://dx.doi.org/10.1109/dasc.2009.85.
Full text