Data encryption in virtual machine transfer over cloud network
暂无分享,去创建一个
[1] Mladen A. Vouk,et al. Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.
[2] K Lalitha,et al. SEDAS: A Self Destruction for Protecting DataPrivacy in Cloud Storage As A Service Model , 2014 .
[3] Alan McQuinn,et al. Unlocking Encryption: Information Security and the Rule of Law , 2016 .
[4] M. Malathi,et al. Cloud computing concepts , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[5] Shankar Gadhve,et al. Self Destruction System for Protecting Data Privacy in Cloud Storage , 2015 .
[6] P. N. Chatur,et al. Cloud Computing and Security Models: A Survey , 2012 .
[7] Bruno Raffin,et al. Performance Evaluation of Intel Xeon Phi Coprocessor using XKaapi , 2013 .
[8] Darrell M. West,et al. Privacy and Security in Cloud Computing , 2010 .
[9] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[10] Randhir Kumar,et al. Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm , 2015 .
[11] S Savitha,et al. Time Controlled Cloud Environment with Self destructing Data system (SeDas) for Data Confidentiality , 2014 .
[12] Vikrant Chole,et al. Review on Self-Destructive System for Data Privacy on Web Services , 2015 .
[13] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[14] Sudipta Giri,et al. Enhancing Security in Cloud by Self Destruction Mechanism , 2015 .