共 13 条
[1]
[Anonymous], 1999, Information warfare and security
[2]
[Anonymous], 2009, Advanced Encryption Standard
[3]
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[4]
Buyya Rajkumar, 2009, 2009 International Conference on High Performance Computing & Simulation (HPCS), P1, DOI 10.1109/HPCSIM.2009.5192685
[5]
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (06)
:599-616
[6]
Chun B. N., 2004, P 37 ANN HAW INT C I, P9
[7]
Corin R, 2005, INT FED INFO PROC, V173, P187
[8]
Dwivedula C., 2012, INT J ENG RES APPL, V3, P35
[9]
Jiyi Wu, 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI 2010), P380, DOI 10.1109/ICICCI.2010.119
[10]
Shah MehulA., 2008, IACR Cryptology ePrint Archive, V2008, P186