共 9 条
[1]
Albadri Hussein, 2016, Journal of Theoretical and Applied Information Technology, V93, P412
[2]
Aman A. H. M., 2019, 3 INT MULT C ENG SCI
[3]
Amini R, 2018, INT J ADV COMPUT SC, V9, P189
[4]
Ghaleb HSM, 2017, INT CONF ELECT ENG
[5]
Gupta P, 2018, PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, P163, DOI 10.1109/CONFLUENCE.2018.8442788
[6]
Ibrahim R., 2019, 3 INT MULT C ENG SCI
[7]
Modak A, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P7, DOI 10.1109/ICICCT.2018.8473104
[8]
Singh M, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P708, DOI 10.1109/CCAA.2015.7148468
[9]
A Study on Data Storage Security Issues in Cloud Computing
[J].
2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016,
2016, 92
:128-135