Funder
Foundation for Distinguished Young Scholars of Fujian Agriculture and Forestry University
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Ab Rahman NH, Cahyani NDW, Choo KKR (2017) Cloud incident handling and forensic-by-design: cloud storage as a case study. In: Concurrency & Computation Practice & Experience
2. Agrawal V (2017) A comparative study on information security risk analysis methods. Journal of Computers
3. Ahmad M, Farooq O (2011) Secure satellite images transmission scheme based on chaos and discrete wavelet transform. In: High Performance Architecture and Grid Computing, Berlin, Heidelberg, pp 257–264
4. Al-Dhuraibi Y, Paraiso F, Djarallah N, Merle P (2018) Elasticity in cloud computing: state of the art and research challenges. IEEE Trans Serv Comput 11(99):430–447
5. Bao L, Zhou Y (2015) Image encryption: Generating visually meaningful encrypted images. Information Sciences 324:197–207
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献