Author:
Galibus Tatiana,de B. Vieira Thiago P.,de Freitas Edison P.,de O. Albuquerque Robson,C. L da Costa Jo ao Paulo,T. de Sousa Júnior Rafael,Krasnoproshin Viktor,Zaleski Anton,Vissia H. E. R. M.,Galdo Giovanni del
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference38 articles.
1. Cloud security alliance (2016) Top Threats Working Group https://cloudsecurityalliance.org/group/top-threats , accessed: 2016-01-15
2. B. D. S. BV (2016) Storgrid EFSS: Secure Enterprise File Sharing Software http://www.storgrid.com , accessed: 2016-01-15
3. Bellovin S M, Merritt M (1992) Encrypted key exchange: Password-based protocols secure against dictionary attacks Proceedings., 1992 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE, pp 72–84
4. Bogos S, Boureanu I, Vaudenay S (2013) Primeless factoring-based cryptography Applied Cryptography and Network Security. Springer, pp 552–569
5. Campbell M (2015). Cloud data encryption is easy. Cloud Cyphercloud blog http://www.ciphercloud.com/blog/cloud-data-encryption-easy/ , accessed: 2016-01-15
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献