共 27 条
[1]
Md. Alamgir H., Jannatul F., Marjia K., A study and implementation of large-scale log-determinant computation to cloud, Int J Comput Appl, pp. 1-9, (2019)
[2]
Xiaowei Y., Xiaosong Z., Ting C., The research and design of cloud computing security framework, Adv Comput Commun Control Autom, 121, pp. 757-763, (2011)
[3]
Jamil D., Zaki H., Cloud computing security, Int J Eng Sci Technol, 3, pp. 3478-3483, (2011)
[4]
Aamir N., Cloud computing: security issues and challenges, J Wirel Commun, 1, pp. 10-15, (2016)
[5]
Adnaan A., Thariq H., Cloud computing: study of security issues and research challenges, Int J Adv Res Comput Eng Technol, 7, pp. 2278-1323, (2018)
[6]
Subhashini P., Yeshwanth R., Securing cloud data using encryption algorithms, Int J Adv Res Sci Eng, 6, pp. 1188-1194, (2017)
[7]
Rohit B., Sugata S., A survey on security issues in cloud computing and associated mitigation techniques, Int J Comput Appl, 47, pp. 47-66, (2012)
[8]
Geetanjali C., Jainul A., Modified secure two way authentication system in cloud computing using encrypted one time password, Int J Comput Sci Inform Technol, 5, pp. 4077-4080, (2014)
[9]
Shweta M., Chander V., A hybrid approach for securing biometric template, Int J Eng Adv Technol, 2, pp. 2249-8958, (2013)
[10]
Arun R., Anil J., James R., A hybrid fingerprint matcher, Pattern Recognit., 3, pp. 795-798, (2002)