Author:
Sutradhar Nirupam,Sharma Madhuwesh Kumar,Sai Krishna G.
Reference30 articles.
1. Popović K, Hocenski Ž (2010) Cloud computing security issues and challenges. In: The 33rd international convention mipro. IEEE, pp 344–349
2. Kuyoro SO, Ibikunle F, Awodele O (2011) Cloud computing security issues and challenges. Int J Comput Netw IJCN 3(5):247–255
3. Priyadarshi R, Soni SK, Sharma P (2019) An enhanced GEAR protocol for wireless sensor networks. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-13-0776-8_27
4. Priyadarshi R, Rawat P, Nath V (2018) Energy dependent cluster formation in heterogeneous wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-018-4116-7
5. Yang J, Chen Z (2010) Cloud computing research and security issues. In: 2010 international conference on computational intelligence and software engineering, IEEE, pp 1–3
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献