共 18 条
[1]
Ashalatha R, 2012, INT J INTERNET COMPU, VI
[2]
Ashalatha R, 2012, INT J ADV TECHNOLOGY, V2
[3]
A Review and Comparative Analysis of Various Encryption Algorithms
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2015, 9 (04)
:289-306
[4]
Femandes Diogo A. B., 2013, SECURITY ISSUES CLOU
[5]
Golden B., 2011, VIRTUALIZATION DUMMI, V1st
[6]
A quantitative analysis of current security concerns and solutions for cloud computing
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2012, 1 (01)
:1-18
[7]
Hashizume K., 2013, J INTERNET SERVICES
[8]
He Zongjian, 2012, NETWORKING DISTRIBUT
[9]
Jarnrnal Manar, 2014, COMPUTER NETWORKS, V72
[10]
Mahjoub Meriam, 2011, P 2011 1 INT S NETW