AES and MD5 based secure authentication in cloud computing
暂无分享,去创建一个
[1] Merve Bayramusta,et al. A fad or future of IT?: A comprehensive literature review on the cloud computing research , 2016, Int. J. Inf. Manag..
[2] Tejinder Sharma,et al. Security Algorithms for Cloud Computing , 2017 .
[3] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[4] Mohammed El Ghazi,et al. Cloud computing: Security challenges , 2012, 2012 Colloquium in Information Science and Technology.
[5] Anju Sharma,et al. IDPS based framework for security in green cloud computing and comprehensive review on existing frameworks and security issues , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).
[6] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[7] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[8] Latifa Ben Arfa Rabai,et al. Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems , 2016, ANT/SEIT.
[9] Ashwini R. Tonde,et al. REVIEW PAPER ON FPGA BASED IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM , 2014 .
[10] Vinay Avasthi,et al. Security Algorithms for Cloud Computing , 2016 .