共 10 条
- [1] Hu Yan, 2013, CLOUD COMPUTING DATA, V2, P212
- [2] A strengthening plan for enterprise information security based on cloud computing [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2014, 17 (03): : 703 - 710
- [3] Manjusha R., 2014, 2014 International Conference on Embedded Systems (ICES), P116, DOI 10.1109/EmbeddedSys.2014.6953101
- [4] Hybrid encryption algorithms in cloud computing [J]. Information Technology Journal, 2013, 12 (14) : 3015 - 3019
- [7] WU Xudong, 2011, NETINFO SECURITY, V9, P18
- [8] Xiong Lizhi, NCURRENCY COMPUTAT, V20, P105
- [9] Xu Lwi, 2012, VALUE ENG, V9, P20
- [10] ZHANG Wenke, 2012, INFORM SECURITY COMM, V11, P38