Design and Implementation of Preprocessor for Dynamic Analysis of Sports Information
Publisher
Springer Singapore
Reference8 articles.
1. Paxton NC (2016) Cloud security: a review of current issues and proposed solutions. In: International conference on collaboration and internet computing (CIC), 452–455
2. Mahboob T, Zahid M, Ahmad G (2016) Adopting information security techniques for cloud computing—a survey. In: International conference on information technology, information systems and electrical engineering (ICITISEE), 7–11
3. Thalheim J, Bhatotia P, Fetzer C (2016) INSPECTOR: data provenance using intel processor trace (PT). In: International conference on distributed computing systems (ICDCS), pp. 25–34
4. El Makkaoui K, Ezzati A, Beni-Hssane A, Motamed C (2016) Cloud security and privacy model for providing secure cloud services. In: 2016 2nd international conference on cloud computing technologies and applications (CloudTech), 81–86
5. Duncan B, Bratterud A, Happe A (2016) Enhancing cloud security and privacy: time for a new approach?. In: International conference on innovative computing technology (INTECH), 110–115