共 20 条
- [1] Abdul D.S., Elminaam H.M., Kader A., Hadhoud M.M., Performance evaluation of symmetric encryption algorithms, International Conference on Parallel, Distributed and Grid Computing, 8, pp. 58-64, (2009)
- [2] Arora P., Singh A., Tyagi H., Evaluation and comparison of security issues on cloud computing environment, World of Computer Science and Information Technology Journal, 2, 5, pp. 179-183, (2012)
- [3] Bhisikar P., Sahu A., Security in data storage and transmission in cloud compituing, International Journal of Advanced Research in Cloud Science and Software Engineering, 3, 3, pp. 410-415, (2013)
- [4] Chandramohan D., Vengattaraman T., Rajaguru D., Ramachandran B., Dhavachelvan P., A privacy breach preventing and mitigation methodology for cloud serv ice data storage, IEEE International Advanced Computing Conference, (2013)
- [5] Fanfara P., Dankova E., Dufala M., Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication, IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics, pp. 213-217, (2012)
- [6] Gampala V., Inuganti S., Muppidi S., Data security in cloud computing with elliptic curve cryptography, International Journal of Soft Computing and Engineering, 2, pp. 138-141, (2012)
- [7] Gupta S., Satapathy S.R., Mehta P., Tripathy A., A secure and searchable data storage in cloud computing, IEEE International Advance Computing Conference, pp. 106-109, (2012)
- [8] Harjani D., Jethwani M., Keswaney N., Jacob S., Automated parking management system using license plate recognition, Int. J. Computer Technology & Applications, 4, 5, pp. 741-745, (2013)
- [9] Hirani S., Energy Consumption of Encryption Schemes in Wireless Devices Thesis, (2003)
- [10] Jadeja Y., Modi K., Cloud co mputing - Concepts, architecture and challenges, 012 International Conference on Computing, Electronics and Electrical Technologies, pp. 877-879, (2012)