Author:
Kumari Kritika,Saha Sayantani,Neogy Sarmistha
Reference15 articles.
1. Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS05, pp. 94–102. ACM, New York (2005)
2. Mushtaque, A.: Comparative analysis on different parameters of encryption algorithms for information security. IJCSE 2(4), 2347–2693 (2014)
3. Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices
4. Weng, L., Amsaleg, L., Morton, A., Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)
5. Saha, S., Neogy, S.: Case study on a smart surveillance system using WSN and IP webcam. In: IEEE Xplore International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), pp. 36–41 (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献