共 14 条
[1]
[Anonymous], 2013, INT J ADV TECHNOL EN
[2]
[Anonymous], NETWORK SECURITY ESS
[3]
Babu R., 2012, INT J ADV SCI TECHNO, V4
[4]
An Efficient Approach to Enhance Data Security in Cloud Using Recursive Blowfish Algorithm
[J].
ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I,
2014, 248
:575-582
[5]
Disina AH, 2014, ROBUST CAESAR CIPHER
[6]
Gupta Dharmendra K, 2012, J GLOBAL RES COMPUTE, VV3, P60
[7]
Jain Aishwarya, 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015). Proceedings, DOI 10.1109/ISBA.2015.7126353
[8]
KAHATE A., 2013, Cryptography and network security
[9]
Kuppuswamy P, INT J COMPUTER INFOR, V6
[10]
Omolara OE., 2014, COMPUTER ENG INTELLI, V5, P34