Efficient and secure BIG data delivery in Cloud Computing
暂无分享,去创建一个
[1] Gurpreet Singh,et al. Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security , 2013 .
[2] Byung-Gyu Kim,et al. Performance analysis of inter-layer prediction in scalable extension of HEVC (SHVC) for adaptive media service , 2016, Displays.
[3] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[4] Axel Winkelmann,et al. Cloud Computing Data Protection -- A Literature Review and Analysis , 2014, 2014 47th Hawaii International Conference on System Sciences.
[5] Supriya Kinger,et al. Analysis of Security Algorithms in Cloud Computing , 2014 .
[6] George Mastorakis,et al. Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.
[7] Mohit Bhansali,et al. Enhancing Cloud Computing Security using AES Algorithm , 2013 .
[8] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[9] Andrzej Chydzinski,et al. Adaptive Video Streaming: Rate and Buffer on the Track of Minimum Rebuffering , 2016, IEEE Journal on Selected Areas in Communications.
[10] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[11] Sachchidanand Singh,et al. Big Data analytics , 2012 .
[12] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[13] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[14] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[15] George Mastorakis,et al. On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.
[16] Yaser Jararweh,et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.
[17] L. Nelson. Data, data everywhere. , 1997, Critical care medicine.
[18] Abdullah Gani,et al. A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.
[19] Sukhwinder Singh,et al. Mobile Cloud Computing , 2014 .
[20] Joe Celko. Big Data and Cloud Computing , 2014 .
[21] Muttukrishnan Rajarajan,et al. Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis , 2015 .
[22] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[23] Narasimha Rao Vajjhala,et al. Big Data using Cloud Computing - Opportunities for Small and Medium-sized Enterprises , 2016 .
[24] Rajiv Munjal,et al. Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures , 2011 .
[25] Rajkumar Buyya,et al. A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..
[26] Hai Jin,et al. Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.
[27] Sreekanth Rallapalli,et al. Impact of Processing and Analyzing Healthcare Big Data on Cloud Computing Environment by Implementing Hadoop Cluster , 2016 .
[28] Roman Beck,et al. Does Cloud Computing Matter? An Analysis of the Cloud Model Software-as-a-Service and Its Impact on Operational Agility , 2013, 2013 46th Hawaii International Conference on System Sciences.
[29] Daniel M. Batista,et al. A Survey of Large Scale Data Management Approaches in Cloud Environments , 2011, IEEE Communications Surveys & Tutorials.
[30] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[31] Kostas E. Psannis,et al. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..
[32] Sebastian Andersson,et al. A study of the advantages & disadvantages of mobile cloud computing versus native environment , 2013 .
[33] A. Alavi,et al. Opportunities and Challenges , 1998, In Vitro Diagnostic Industry in China.
[34] A A Izang,et al. Big Data and Cloud Computing Issues , 2016 .
[35] Shashank Gupta,et al. Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .
[36] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[37] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[38] George Mastorakis,et al. An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.
[39] Jong-Hyeok Lee,et al. Fast algorithm for the High Efficiency Video Coding (HEVC) encoder using texture analysis , 2016, Inf. Sci..