共 18 条
- [1] Abu-Dawas Motasem A, 2015, INT J COMPUTER INFOR, V4
- [2] Dubey A.K., 2016, P 2016 22 NAT C COMM, P1, DOI DOI 10.1109/C0NSEG.2012.6349503
- [3] Enhancing security in Cloud using Trusted Monitoring Framework [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 198 - 203
- [4] Gayathri Devi P, 2013, INT J INNOVATIVE RES, V2, P306
- [5] George Amalarethinam D I, 2015, INDIAN J SCI TECHNOL, V8, P1
- [6] George Amalarethinam D I, INT J CONTR IN PRESS
- [7] Kahate A., 2010, CRYPTOGRAPHY NETWORK
- [8] Khanezaei Nasrin, 2016, FRAMEWORK BASED RSA, P58, DOI [10.1109/ SPC.2014.7086230, DOI 10.1109/SPC.2014.7086230]
- [9] Krutz Ronald L, 2010, CLOUD SECURITY COMPR
- [10] Mahalle Vishwanath S, 2016, ENHANCING DATA SECUR, P146, DOI [10.1109/INPAC.2014.6981152, DOI 10.1109/INPAC.2014.6981152]