共 10 条
[1]
[Anonymous], 2009, NIST DEFINITION CLOU
[2]
[Anonymous], 2011, INT J COMPUT TRENDS
[3]
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (06)
:599-616
[4]
Jeeva A., 2012, International Journal of Engineering Research and Applications (IJERA), V2, P3033
[5]
A Novel Selective Encryption Method for Securing Text over Mobile Ad hoc Network
[J].
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016,
2016, 79
:16-23
[6]
A Survey On Scheduling Schemes With Security In Wireless Sensor Networks
[J].
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015,
2016, 78
:756-762
[8]
Nanda S., 2005, TECHNICAL REPORT, P11794
[9]
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
[J].
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015,
2016, 78
:617-624
[10]
Ren YL, 2011, 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P1038, DOI 10.1109/WCNC.2011.5779278