Author:
Mohammad Omer K. Jasim,Abbas Safia
Publisher
Springer International Publishing
Reference15 articles.
1. Hill, R., Hirsch, L., Lake, P., Moshiri, S.: Guide to Cloud Computing: Principles and Practice, 1st edn. Springer, Heidelberg (2013). ISBN 1617-7975
2. Ackerman, T.: IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing, 1st edn. Springer, Heidelberg (2013). ISBN 978-3-658-01114-7
3. Chen, C., Lin, J., Wu, X., Wu, J.: Parallel and distributed spatial outlier mining in grid: algorithm, design and application. J. Grid Comput. 13(2), 139–157 (2015)
4. Wu, K., Liu, L., Liu, J.: Researches on grid security authentication algorithm in cloud computing. J. Netw. 6(11), 1639–1646 (2011)
5. Liu, H., Ning, H., Xiong, Q., Yang, L.T.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26(1), 241–251 (2014)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cloud Cryptography;Advances in Computer and Electrical Engineering;2024-01-25
2. Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography;Computer Security – ESORICS 2021;2021