Publisher
Springer International Publishing
Reference48 articles.
1. Ahmed, I., James, A., & Singh, D. (2013). Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP. Security and Communication Networks, 7(2), 293–308.
2. Ahuja, R. (2011). SLA based scheduler for cloud storage and computational services. International Conference on Computational Science and Applications (ICCSA), pp. 258–262.
3. Alani, M. M. (2010). Testing randomness of block-ciphers using diehard test. International Journal of Computer Science and Network Security, 10(4), 53–57.
4. Albeshri, A., & Caelli, W. (2010). Mutual protection in a cloud computing environment. 12th IEEE international conference on High performance Computing and Communications (HPCC), pp. 641–646.
5. Alger, D. (2005, June). Build the best data center facility for your business. Indianapolis: Cisco Press Book.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献