1. Enhancing the security of identity and access management in cloud computing using elliptic curve cryptography;Abbas;Int. J. Emerg. Res. Manag. Technol.,2015
2. Ahmed, Amjed Sid, Hassan, Rohayanti, Ali, Z.M., 2012. Eliminate spoofing threat in IPv6 tunnel. In: Proceedings of the 8th International Conference on Information Science and Digital Content Technology (ICIDT), IEEE, Vol. 1, pp. 218–222.
3. Security in cloud computing: Opportunities and challenges;Ali;Inf. Sci.,2015
4. Identity based approach for cloud data integrity in multi-cloud environment;Al-Saffar;Identity,2015
5. Anala, M.R., Shetty, Jyoti, Shobha, G., 2013. A framework for secure live migration of virtual machines. In: Proceedings of International Conference on, Advances in Computing, Communications and Informatics (ICACCI). IEEE, pp. 243–248.