Sir , I have a question .Can we perform search operations on Encrypted data using this approach? I assume sensitive fields like SSN are encrypted and store into the DB (not disk level encryption) in such cases how do search operations works?
hi mike i hope this comment reaches you; i have a theoritical question: lets pretend i have a bank vault using this new encryption, and i place my will inside, and only I AM SUPPOSED to be able to access it to make changes. but because it uses this new encrypt, could someone then read the contents of my will in a data form? i hope this analogy makes sense best regards
Sir , I have a question .Can we perform search operations on Encrypted data using this approach? I assume sensitive fields like SSN are encrypted and store into the DB (not disk level encryption) in such cases how do search operations works?
Can you film these in one go or does it take you a few times to get it right? Always amazing, Dr. Chapple
It’s usually one or two takes. Unless I get tongue tied!
what does it mean ot9de?
hi mike i hope this comment reaches you; i have a theoritical question: lets pretend i have a bank vault using this new encryption, and i place my will inside, and only I AM SUPPOSED to be able to access it to make changes. but because it uses this new encrypt, could someone then read the contents of my will in a data form? i hope this analogy makes sense best regards
Thanks for the video..
Great and simple explanation.
Very Informative video!!
Great video
Thanks for the video!
Thanks Mike!
Thank you mike
Too much advertising and non relevant information and lacks any real info.
Surface scratching
really only need the last 30 seconds of the video. wasting time the first 2/3 rds of the video
Homomorphic Encryption. he he...