A Framework for Data Storage Security in Cloud
暂无分享,去创建一个
[1] Jie Ling,et al. Simple and effective one-time password authentication scheme , 2013, 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA).
[2] C. Shoba Bindu,et al. Click based Graphical CAPTCHA to thwart spyware attack , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[3] Darren Robinson,et al. A hybrid CMA-ES and HDE optimisation algorithm with application to solar energy potential , 2009, Appl. Soft Comput..
[4] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[5] Navneet Kaur,et al. Analytical review of three latest nature inspired algorithms for scheduling in clouds , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[6] Khumanthem Manglem Singh,et al. Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .
[7] Shafii Muhammad Abdulhamid,et al. Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities , 2016, J. Netw. Comput. Appl..
[8] Osama S. Farag Allah,et al. Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .
[9] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[10] Kakali Chatterjee,et al. Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..
[11] Max Mühlhäuser,et al. Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[12] Shahriar Lotfi,et al. Modified cuckoo optimization algorithm (MCOA) to solve graph coloring problem , 2015, Appl. Soft Comput..
[13] Rohitash Kumar Banyal,et al. Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.
[14] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.