共 50 条
- [31] Hybrid Cryptographic Access Control for Cloud-Based EHR Systems IEEE CLOUD COMPUTING, 2016, 3 (04): : 58 - 64
- [32] Device-Based Isolation for Securing Cryptographic Keys 4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 1130 - 1135
- [35] Securing KVM-based Cloud Systems via Virtualization Introspection 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 5028 - 5037
- [36] Cloud computing platform: Performance analysis of prominent cryptographic algorithms CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
- [37] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
- [38] The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms 2017 SECOND RUSSIA AND PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC 2017), 2017, : 180 - 183
- [39] On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS 2022 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2022,
- [40] Cryptographic algorithms for distributed measurement and control systems PRZEGLAD ELEKTROTECHNICZNY, 2008, 84 (05): : 273 - 276