Author:
Cordova Ronald S.,Maata Rolou Lyn R.,Halibas Alrence S.,Al-Azawi Rula
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance Analysis of Cryptographic Algorithms in Cloud Computing Systems;2024 International Conference on Inventive Computation Technologies (ICICT);2024-04-24
2. Cloud forensics: A centralized cloud provenance investigation system using MECC;Concurrency and Computation: Practice and Experience;2023-11-08
3. Client-Level Monitoring Approach to Secure Data in a Cloud Environment;2023 6th International Conference on Contemporary Computing and Informatics (IC3I);2023-09-14
4. Performance Analysis of Twofish Cryptography Algorithm in Big Data;Proceedings of the 2020 9th International Conference on Software and Information Engineering (ICSIE);2020-11-11
5. Performance Analysis of AES, Blowfish and Rijndael: Cryptographic Algorithms for Audio;Rising Threats in Expert Applications and Solutions;2020-10-02