1. Ahmad, I., Bakht, H., Mohan, U.: Cloud computing- threats and challenges. J. Comput. Manage. Stud. 1(1), 1–12 (2017). https://www.researchgate.net/publication/319725257_Cloud_Computing__Threats_and_Challenges
2. Alam, S.B.: Cloud computing – architecture, platform and security issues: a survey. World Sci. News 86(3), 253–264 (2017). http://www.worldscientificnews.com/wpcontent/uploads/2017/08/WSN-863-2017-253-264-1.pdf
3. Alsmadi, D., Prybutok, V.: Sharing and storage behavior via cloud computing: security and privacy in research and practice. Comput. Hum. Behav. 85, 218–226 (2018). https://doi.org/10.1016/j.chb.2018.04.003
4. Al-Haija, Q.A., Tawalbeh, L.A.: Efficient algorithms and architectures for elliptic curve cryptoprocessor over GF (P) using new projective coordinates systems. J. Inf. Assur. Securi. (JIAS), 7, 063–072 (2010)
5. Bianchini, R., Fontoura, M., Cortez, E., Bonde, A., Muzio, A., Constantin, A., Moscibroda, T., Magalhaes, G., Bablani, G., Russinovich, M.: Toward ML-centric cloud platforms. Commun. ACM 63(2), 50–59 (2020). https://doi.org/10.1145/3364684