ENCODING-MAT: A Novel Encryption Method to Secure Information in Cloud Storage
暂无分享,去创建一个
[1] Martin Gilje Jaatun,et al. Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.
[2] George Reese,et al. Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .
[3] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[4] Hanim Eken,et al. Security threats and solutions in cloud computing , 2013, World Congress on Internet Security (WorldCIS-2013).
[5] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[6] Frederico Araújo Durão,et al. A systematic review on cloud computing , 2014, The Journal of Supercomputing.
[7] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[8] M Hemalatha,et al. An Enhanced Code Encryption Approach with HNT Transformations for Software Security , 2012 .
[9] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[10] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[11] Veer Sain Dixit,et al. Cloud Computing: State of the Art and Security Issues , 2015, SOEN.
[12] P. Mythili,et al. Matrix based cryptographic procedure for efficient image encryption , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Varghese Paul,et al. A FAST AND SECURE ENCRYPTION ALGORITHM FOR MESSAGE COMMUNICATION , 2007 .
[15] M. Hemalatha,et al. Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software , 2013 .
[16] Wuling Ren,et al. A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication , 2010, 2010 Second International Conference on Modeling, Simulation and Visualization Methods.
[17] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[18] Amit Garg. Cloud Computing: Security Issues and Challenges , 2013 .
[19] Kamal Dahbur,et al. A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.
[20] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[21] Omer Reingold,et al. A New Interactive Hashing Theorem , 2007, Computational Complexity Conference.