Author:
Mohamed Sirajudeen Y.,Anitha R.
Reference14 articles.
1. Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, NIST Special publication, pp. 800–145 (2011)
2. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen cipher text attack. Int. Cryptol. Conf. 1462, 13–25 (1998)
3. Diffie, W., Hellman, E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
4. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1976)
5. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology-CRYPTO ’84, pp. 10–18 (1985)