共 18 条
- [1] Ashalatha R, 2012, INT J INTERNET COMPU, VI
- [2] Ashalatha R, 2012, INT J ADV TECHNOLOGY, V2
- [3] A Review and Comparative Analysis of Various Encryption Algorithms [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 289 - 306
- [4] Femandes Diogo A. B., 2013, SECURITY ISSUES CLOU
- [5] Golden B., 2011, VIRTUALIZATION DUMMI, V1st
- [6] A quantitative analysis of current security concerns and solutions for cloud computing [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 : 1 - 18
- [7] Hashizume K., 2013, J INTERNET SERVICES
- [8] He Zongjian, 2012, NETWORKING DISTRIBUT
- [9] Jarnrnal Manar, 2014, COMPUTER NETWORKS, V72
- [10] Mahjoub Meriam, 2011, P 2011 1 INT S NETW