Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference31 articles.
1. Rastogi G, Sushil R (2015) Cloud computing security and homomorphic encryption. IUP J Comput Sci 9(3):48–58
2. Guo L, Zheng X, Ding C, Mu D, Li Z (2015) Cloud service recommendation: State of the art and research challenges. In 2015 15th IEEE/ACM international symposium on cluster, cloud and grid computing (pp 761–764). IEEE
3. Rastogi G, Sushil R (2016) Performance analysis of live and offline vm migration using kvm. Int J Mod Educ Comput Sci 8(11):50
4. Arora PR, Verma G (2011) Implementation of authentication and transaction security based on Kerberos. IJITCE, 7
5. Verma G, Adhikari S (2020) Cloud computing security issues: a Stakeholder’s perspective. SN Comput Sci 1(6):1–8