partial key

partial key

(database)
A key which identifies a subset of a set of information items (e.g. database "records"), and which could narrow the subset to one item if other partial key(s) were combined with it.
Mentioned in ?
References in periodicals archive ?
The main objective of the project will be achieved through the implementation of partial key activities: an increase in the number of social workers, professional development of employees performing agenda Child protection (education in accredited courses, supervision), creating conditions for working directly with clients and developing a methodology standardization OSPOD
It outputs the receiver's partial key [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].
Unlike usual proofs in which every user with a unique partial key signcrypts one message, in our proof each node aggregate-signcrypts a number of messages [m.
Mathematical theorems and proofs are provided for analyzing different kinds of plaintext attacks, small public exponent attacks, lattice attacks, partial key exposure attacks, and modulus attacks.
Generally, students are offered a partial key or a partial list of definitions by way of demonstrating how a particular language works.
For master key recovery, the system supports splitting the master key among different security officers and requiring a set number of those offers injecting their partial key for recovery.
After prefix compression, the partial key could be "SEPHSON FLOWERS" (or could just as well be "SEPINE").
Chaum's contributions to cryptography include the invention of two anonymity networks - mix networks, the basis for virtually all modern anonymity networks and DC-Nets, including the invention of partial key techniques and the invention of cryptographic voting.
Incorporating an enhanced tree structure implementation, Objectivity/DB's tree-based collections (ooTreeSetX, ooTreeMapX, and ooTreeListX) now feature the option of caching partial key data in tree nodes; thereby avoiding touching many actual object pages during ingest comparisons.
Built into VisualView are sophisticated retrieval functions that offer users the capability to search and retrieve folders and documents by full or partial key fields.
By using RSA based threshold cryptography [3] (RSA-TC), Lagrange's interpolation and the generation of polynomial is for generating partial keys.

Full browser ?