Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395–404
2. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129–2151
3. Alzain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences, IEEE, pp 5490–5499
4. Alzain Mohammed A, Soh Ben, Pardede Eric (2012b) A new model to ensure security in cloud computing services. J Serv Sci Res 4:49–70
5. Balasaraswathi VR, Manikandan S (2014) Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In: 2014 IEEE international conference on advanced communications, control and computing technologies, IEEE, pp 1190–1194
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Dynamic Clustering Mechanism;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01
2. Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication;International Journal of Computers and Applications;2023-10-18
3. Detection of Malicious URL Websites using Machine Learning Models;2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC);2023-07-06
4. Face Detection and Recognition for Criminal Identification;2023 8th International Conference on Communication and Electronics Systems (ICCES);2023-06-01
5. Semantic analysis of blockchain intelligence with proposed agenda for future issues;International Journal of System Assurance Engineering and Management;2023-02-25