Author:
Mahapatra Prasanta Kumar,Tripathy Alok Ranjan,Tripathy Alakananda,Mishra Biraja
Reference26 articles.
1. H.A. Al Hamid, S.M. Rahman, M.S. Hossain, A. Almogren, A. Alamri, A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313–22328 (2017)
2. J.Z. Luo, J.H. Jin, A.B. Song, F. Dong, Cloud computing: architecture and key technologies. 32(7), 3–21 (2011)
3. P. Fremantle, P. Scott, A survey of secure middleware for the Internet of Things. PeerJ Comput. Sci. 3 (2017)
4. R. Nigoti, M. Jhuria, S. Singh, A survey of cryptographic algorithms for cloud computing (2013)
5. U.R. Jadhav, A review of cloud computing and security algorithms 7(1) (2015)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献