Enhanced Cloud Security Implementation Using Modified ECC Algorithm
暂无分享,去创建一个
P. M. Rubesh Anand | M. Thangapandiyan | K. Sakthidasan Sankaran | K. Sankaran | M. Thangapandiyan | P. Anand
[1] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[2] Aswin Achuthshankar,et al. Encryption of Reversible Data Hiding for Better Visibility and High Security , 2016 .
[3] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[4] Rajkumar Buyya,et al. Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.
[5] Muhammad Sher,et al. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography , 2016, Electron. Commer. Res..
[6] Li Lin,et al. PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments , 2018, IEEE Access.
[7] N. Kshetri. Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .
[8] Sathya Narayanan,et al. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud , 2015 .
[9] Paul D. Manuel,et al. A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..
[10] Radulescu Constanta Zoie. Cloud Provider's Services Evaluation Using Triangular Fuzzy Numbers , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).
[11] Rajkumar Buyya,et al. A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..