Author:
Thillaiarasu N.,Chenthur Pandian S.,Naveen Balaji G.,Benitha Shierly R. M.,Divya A.,Divya Prabha G.
Publisher
Springer International Publishing
Reference12 articles.
1. Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: International Conference on Microelectronic Devices, Circuits and systems (ICMDCS). IEEE (2016)
2. Shyamambika, N., Thillaiarasu, N.: A survey on acquiring integrity of shared data with effective user termination in s cloud. In: The Proceedings of International Conference on Intelligent Systems and Control (ISCO16). IEEE (2016). https://doi.org/10.1109/isco.2016.7726893
3. Thillaiarasu, N., Chenthur Pandian, S.: Enforcing security and privacy over multi-loud framework using assessment techniques. In: The Proceedings of International Conference on Intelligent Systems and Control (ISCO16). IEEE (2016). https://doi.org/10.1109/isco.2016.7727001
4. Jain, M., Agrawal, A.: Implementation of hybrid cryptography algorithm. Int. J. Core Eng. Manag. 1(3), 1–8 (2014)
5. Shyamambika, N., Thillaiarasu, N.: Attaining integrity, secured data sharing and removal of misbehaving client in the public cloud using an external agent and secure encryption technique. Adv. Nat. Appl. Sci. 10(9), 421–431 (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献