Author:
Goodarzi Koorosh,karimi Abbas
Reference9 articles.
1. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, “Future Generation computer systems, vol. 25, pp. 599-616, 2009.
2. F. Saeed and M. Rashid, “Integrating Classical Encryption with Modern Technique,” IJCSNS International Journal of Computer, vol. 280, pp. 280-285, 2010.
3. P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, “RFID systems: A survey on security threats and proposed solutions,” in Personal Wireless Communications, 2006, pp. 159-170.
4. N. Jain and G. Kaur, “Implementing DES Algorithm in Cloud for Data Security,” International Journal of Computer Science&InformationTechnologyVSRD-IJCSIT, vol. 2, pp. 316-321, 2012.
5. D. Salomon, Data privacy and security: encryption and information hiding: Springer, 2003.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancement of Cloud Security and Strength of Service Using Trust Model;International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018;2018-12-21
2. RAICB: Robust Authentication Immunity Cloud Bucket for Secure Cloud Storage System;Emerging Research in Computing, Information, Communication and Applications;2015