共 46 条
[1]
Aldossary S, 2016, INT J ADV COMPUT SC, V7, P485
[2]
Arora A, 2017, PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), P288, DOI 10.1109/CONFLUENCE.2017.7943164
[3]
Advantages and challenges of adopting cloud computing from an enterprise perspective
[J].
7TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2013),
2014, 12
:529-534
[4]
A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing
[J].
2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015),
2015,
:189-196
[6]
Multimodal Biometric Authentication using PSO based Watermarking
[J].
2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012),
2012, 4
:612-618
[7]
Enterprise Cloud: its Growth & Security Challenges in China
[J].
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018),
2018,
:144-152
[8]
Choudhary Swati K., 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P1062, DOI 10.1109/ICOEI.2019.8862563
[9]
Dahiya N., 2017, International Journal of Advanced Research in Computer Science, V8, P146, DOI DOI 10.26483/IJARCS.V8I8.4636
[10]
An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks
[J].
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC),
2012,
:1106-1115