Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference90 articles.
1. Lim, S. Y., Kiah, M. L., & Ang, T. F. (2017). Security issues and future challenges of cloud service authentication. Acta Polytechnica Hungarica, 14, 69–89.
2. Ajmal, A., Ibrar, S., & Amin, R. (2022). Cloud computing platform: Performance analysis of prominent cryptographic algorithms. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.6938
3. Kazim, M., & Zhu, S. Y. (2015). A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications 6.
4. Nicho, M., & El Hendy, M. (2013). Dimensions of security threats in cloud computing: A case study. Review of Business Information Systems (RBIS), 17, 159.
5. Raza, S. M., Ahvar, S., Amin, R., & Hussain, M. (2021). Reliability aware multiple path installation in software-defined networking. Electronics, 10, 2820. https://doi.org/10.3390/electronics10222820
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献