Cloud Computing Security
暂无分享,去创建一个
[1] J. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[2] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[3] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[4] Tim Mather,et al. Cloud security and privacy , 2009 .
[5] Rao Mikkilineni,et al. Cloud Computing and the Lessons from the Past , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[6] Anders Eriksson,et al. What Networking of Information Can Do for Cloud Computing , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[7] Paul Mcfredries,et al. Technically speaking: The cloud is the computer , 2008 .
[8] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[9] S. Mendelson,et al. Uniform Uncertainty Principle for Bernoulli and Subgaussian Ensembles , 2006, math/0608665.
[10] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[11] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[12] Doug Johnson,et al. Computing in the Clouds. , 2010 .
[13] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .