IVAN, Ion; TOMA, Cristian - In: Informatica Economica X (2006) 3, pp. 25-29
The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed systems. It is proved that a...