Author:
Attri Jasmine,Kaur Prabhpreet
Reference18 articles.
1. Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts, pp. 44–60 (1998). https://doi.org/10.1007/3-540-68671-1_4
2. Sohal, M., Sharma, S.: BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. J. King Saud Univ. Comput. Information Sci. (2018). https://doi.org/10.1016/j.jksuci.2018.09.024
3. NIST: The NIST definition of cloud computing. Observatorio Económico EEUU, no. BBVA Research, pp. 1–8 (2016). https://doi.org/10.6028/NIST.SP.800-145
4. Sridhar, S., Smys, S.: Intelligent security framework for IoT devices. In: International Conference on Inventive Systems and Control (ICISC-2017) Intelligent, 1–5 (2017)
5. El-Yahyaoui, A., Ech-Chrif El Kettani, M.D.: Data privacy in cloud computing. In: 2018 4th International Conference on Computer and Technology Applications, ICCTA 2018, 25–28. Institute of Electrical and Electronics Engineers Inc (2018). https://doi.org/10.1109/CATA.2018.8398650
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献