The improved DROP security based on hard AI problem in cloud
暂无分享,去创建一个
[1] Pradeep K. Khosla,et al. Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .
[2] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[3] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[4] P. Venkata Krishna,et al. A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology , 2014, IEEE Journal of Biomedical and Health Informatics.
[5] Ishfaq Ahmad,et al. Comparison and analysis of ten static heuristics-based Internet data replication techniques , 2008, J. Parallel Distributed Comput..
[6] Mark Newman,et al. Networks: An Introduction , 2010 .
[7] Albert Y. Zomaya,et al. On the Characterization of the Structural Robustness of Data Center Networks , 2013, IEEE Transactions on Cloud Computing.
[8] Viswanathan Perumal,et al. A Survey on Various Problems and Techniques for Optimizing Energy Efficiency in Cloud Architecture , 2017 .
[9] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[11] Krzysztof Golofit. Click Passwords Under Investigation , 2007, ESORICS.
[12] Miss Laiha Mat Kiah,et al. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.
[13] Peng Li,et al. On the optimal placement of secure data objects over Internet , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[14] Albert Y. Zomaya,et al. Energy-efficient data replication in cloud computing datacenters , 2013, GLOBECOM Workshops.
[15] Benny Pinkas,et al. Securing passwords against dictionary attacks , 2002, CCS '02.
[16] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[17] P. Viswanathan,et al. A green energy optimized scheduling algorithm for cloud data centers , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[18] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[20] Hai Tao,et al. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords , 2008, Int. J. Netw. Secur..
[21] Ishfaq Ahmad,et al. Static and adaptive distributed data replication using genetic algorithms , 2004, J. Parallel Distributed Comput..
[22] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[23] Albert Y. Zomaya,et al. Quantitative comparisons of the state‐of‐the‐art data center architectures , 2013, Concurr. Comput. Pract. Exp..
[24] P Sanjeevi,et al. Towards energy-aware job consolidation scheduling in cloud , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[25] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[26] Nasir D. Memon,et al. Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.
[27] P Sanjeevi,et al. A 24 hour IoT framework for monitoring and managing home automation , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).