Author:
Buja Alya Geogiana,Latip Shekh Faisal Abdul
Reference20 articles.
1. A History of Cloud Computing. Retrieved Online: http://www.computerweekly.com/feature/A-history-of-cloud-computing.
2. Ark, W.S., Selker, T., ‘A look at human interaction with pervasive computers’, IBM Systems Journal, 38: 4 (1999), pp. 504-07.
3. The SIMON and SPECK Families of Lightweight Block Ciphers;Beaulieu;IACR Cryptology ePrint Archive,2013
4. Big Data. Retrieved Online: http://searchcloudcomputing.techtarget.com/definition/big-data-Big-Data.
5. Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., & Mickunas, M.D. (2003). Towards security and privacy for pervasive computing. In Software Security—Theories and Systems (pp. 1-15). Springer Berlin Heidelberg.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献