共 30 条
[1]
Agnihotri M.A., 2020, Our Herit., V68, P175
[2]
Amalarethinam DG., 2019, J PHYS SCI, V24, P133
[3]
Benzekki K, 2016, INT J ADV COMPUT SC, V7, P293
[4]
Bhandari A., 2016, Secure Algorithm for Cloud Computing and ItsApplications
[5]
Security Algorithms for Cloud Computing
[J].
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016),
2016, 85
:535-542
[6]
Ennajjar Ibtissam, 2016, International Journal of Cloud Computing, V5, P198, DOI 10.1504/ijcc.2016.080045
[7]
George Amalarethinam D.I., 2018, Int. J. Pure Appl. Math., V118, P85
[8]
George Amalarethinam D.I., 2016, Int. J. Sci. Eng. Res. (IJSER), V7, P1669
[9]
George D. I., 2014, International Journal of Computer Applications, V975, P38
[10]
Jabbar I., 2016, Internet Things Cloud Comput, V4, P13