A Framework for Data Storage Security with Efficient Computing in Cloud
暂无分享,去创建一个
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Luigi Coppolino,et al. Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..
[3] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[4] Kakali Chatterjee,et al. Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..
[5] Santanu Chaudhury,et al. Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..
[6] Araceli Queiruga Dios,et al. Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme , 2015, Cryptologia.
[7] Bhekisipho Twala,et al. An adaptive Cuckoo search algorithm for optimisation , 2018, Applied Computing and Informatics.
[8] Mhamed Zineddine,et al. Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights , 2015, Comput. Secur..
[9] Max Mühlhäuser,et al. Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[10] Sarbjeet Singh,et al. A review of metaheuristic scheduling techniques in cloud computing , 2015 .
[11] Gary B. Wills,et al. Protecting data in personal cloud storage with security classifications , 2015, 2015 Science and Information Conference (SAI).
[12] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[13] Saida Makhloufi,et al. Three powerful nature-inspired algorithms to optimize power flow in Algeria's Adrar power system , 2016 .
[14] Fahd M. Al-Dosari,et al. A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.