Introduction - If you have any usage issues, please Google them yourself
database encryption technology hash function of the hash function on the basic principles and design requirements, combination of public key encryption method of digital certificates and digital signature technology, Discussion on the hash function such as password protection of users to identify and access permissions data encryption technology applications
Packet : 39709590database_encrypt.zip filelist
数据库加密技术中散列函数的应用.pdf