Filters








293,568 Hits in 6.6 sec

Author Index Volume 11 (2003)

<span title="2003-10-01">2003</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
IOS Press Author Index Volume 11 (2003) The issue number is given in front of the page numbers. Abadi, M., see Kakkar, P. (2) 245 -287 Altenschmidt, C., J. Biskup, U. Flegel and Y.  ...  Pavlovic, A compositional logic for proving security properties of protocols J., M. Papa and S.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11408">doi:10.3233/jcs-2003-11408</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4qadm7yeyfaplkpycyfr7zvbkq">fatcat:4qadm7yeyfaplkpycyfr7zvbkq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720040248/https://content.iospress.com/download/journal-of-computer-security/jcs11ai?id=journal-of-computer-security%2Fjcs11ai" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0b/ea/0beaa416b946152b11f3faf3964198e417faf2be.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11408"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Study of Soft Computing Based IoT Device Security System

<span title="2020-09-10">2020</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
The ubiquitous computing environment has increased interest in IoT technology.  ...  As IoT has open characteristics in the fields of industry, increased accessibility has raised the possibility of threats. As the IoT network was small on scale, there was risk of security.  ...  Back-propogation neural network is known as the generalized delta rule [10, 11] . It is one of the widely used to train the neural network [12] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.d1799.0991120">doi:10.35940/ijitee.d1799.0991120</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4anujl6imbfeted5zsczuhm6lq">fatcat:4anujl6imbfeted5zsczuhm6lq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928001813/http://www.ijitee.org/wp-content/uploads/papers/v9i11/D1799029420.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/e9/d7e9f95f6b7aad253c9c1c4059602a859d09e731.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.d1799.0991120"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Optimal integrity Policy for Secure Storage of Encrypted Data using Cloud Computing

<span title="2019-09-10">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
Cloud computing is very common at reduced price because of its computing and storage ability. To reduce storage costs, an ever increasing number of information are being moved to the cloud.  ...  Furthermore, customers generate search tokens instead of information holders. We demonstrate that in our system, token privacy and index privacy are all around ensured.  ...  The scheme was suggested to eliminate intensive computing at the utility provider by decreasing the volume of a ciphertext and a secret key. Cai et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k1760.0981119">doi:10.35940/ijitee.k1760.0981119</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ssa43bd6g5eozcficaocyvwlru">fatcat:ssa43bd6g5eozcficaocyvwlru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220223044712/https://www.ijitee.org/wp-content/uploads/papers/v8i11/K17600981119.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/e9/c3e9748943f9278d0138cee13fd8eec9af1002c6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k1760.0981119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Optimization of System Framework for Secure Communication and Data Virtualization on Cloud Computing

<span title="2020-09-10">2020</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
On account of data storage security necessities and distinctiveness of cloud computing environment, a method for secured data & storage based on dynamic allocation and access control mechanism is presented  ...  With a bang in evolution of cloud computing the uniqueness of every organization affects the virtualization of its information communication technology and applications.  ...  The authors [10] , [11] put up outsourcing of frequent computation troubles and preserve the privacy of input file, they'll be modified as outsource decryption in ABE systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k7840.0991120">doi:10.35940/ijitee.k7840.0991120</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bh6gh247wjewtlrz7cxa463hza">fatcat:bh6gh247wjewtlrz7cxa463hza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200922234819/http://www.ijitee.org/wp-content/uploads/papers/v9i11/K78400991120.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k7840.0991120"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

IEEE Computer Society Digital Magazines

<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dsrvu6bllzai7oj3hktnc5yf4q" style="color: black;">Computer</a> </i> &nbsp;
& OnlInE SOcIal nEtwOrkS vOlumE 11 numbEr 3 may/JunE 2013 www.com puter.org/ security May/June 2013 Vol. 11, No. 3  ...  From software architecture to security and networking, these magazines help you stay ahead of the competition: • Computer-our agship magazine with broad techni- cal coverage • IT Professional-critical  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2013.311">doi:10.1109/mc.2013.311</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6wn73v6vfgr3pkdqry3hgkzbm">fatcat:r6wn73v6vfgr3pkdqry3hgkzbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151012115243/http://ieeexplore.ieee.org/ielx7/2/6594745/06594747.pdf?tp=&amp;arnumber=6594747&amp;isnumber=6594745" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2b/5b/2b5b1937085377ef804a48b6de14cc3a50d99c0e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2013.311"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Digital Magazines House Advertisement

<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4hwwgwyqabardl76zzbexzcmhu" style="color: black;">Computing in science &amp; engineering (Print)</a> </i> &nbsp;
& OnlInE SOcIal nEtwOrkS vOlumE 11 numbEr 3 may/JunE 2013 www.com puter.org/ security May/June 2013 Vol. 11, No. 3  ...  From software architecture to security and networking, these magazines help you stay ahead of the competition: • Computer-our agship magazine with broad techni- cal coverage • IT Professional-critical  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcse.2013.120">doi:10.1109/mcse.2013.120</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hvw4pkpzk5fh3ngpppdolylkue">fatcat:hvw4pkpzk5fh3ngpppdolylkue</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151008174525/http://ieeexplore.ieee.org/ielx7/5992/6731366/06731458.pdf?tp=&amp;arnumber=6731458&amp;isnumber=6731366" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/4d/9a4dfcb5dd58d4d9aa55a548cd1529ab5a049ab3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mcse.2013.120"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

Gurpreet Singh, Supriya Supriya
<span title="2013-04-18">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure.  ...  Encryption is the process of scrambling a message so that only the intended recipient can read it. Encryption can provide a means of securing information.  ...  -Sriram Ramanujam and Marimuthu Karuppiah, &quot;Designing an algorithm with high Avalanche Effect&quot;, IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, pp. 106-111  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/11507-7224">doi:10.5120/11507-7224</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ubssrj6znbhchkdhpxw2llumwa">fatcat:ubssrj6znbhchkdhpxw2llumwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709060445/https://www.ijcaonline.org/archives/volume67/number19/11507-7224?format=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/79/d5791c60d879b7dca836124794e2dc60959b2e4a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/11507-7224"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Literature Survey on Door Lock Security Systems

Pradnya R., J. P., S. R., K. P.
<span title="2016-11-17">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
security where possibilities of incursion are increasing day by day.  ...  As security becomes major problem nowadays, the security monitoring systems today needs to make use of the latest technology.  ...  International Journal of Computer Applications (0975 -8887) Volume 153 -No2, November 2016 Fig 4: Locker Security System 3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911971">doi:10.5120/ijca2016911971</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kxmxuuq6kngtbp3mdb6aw35e5q">fatcat:kxmxuuq6kngtbp3mdb6aw35e5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602000218/https://www.ijcaonline.org/archives/volume153/number2/nehete-2016-ijca-911971.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/a1/e7a1d6a40e3e92ca85f1a2a210d5b275afd01b60.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911971"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Editor's preface to the Bell-LaPadula model

Jonathan Millen
<span title="1996-04-01">1996</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
229 This issue includes volume 11 of the Bell-LaPadula model. The Bell-LaPadula model played, and continues to play, an important role in the development of multilevel computer security.  ...  Volume 11 [3] limited the access types to read, write, append, execute, and control.  ...  This process has been completed so far only for Volume 11, in this issue. In the future, we may also publish Volume I and others.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-1996-42-306">doi:10.3233/jcs-1996-42-306</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xxcf6gwwufe3dkzvepejg2ypcq">fatcat:xxcf6gwwufe3dkzvepejg2ypcq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427091048/https://content.iospress.com/download/journal-of-computer-security/jcs4-2-3-06?id=journal-of-computer-security%2Fjcs4-2-3-06" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/bf/02bfed92499cba85ddd424673eb4acb12523966b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-1996-42-306"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1

Sukhchain Singh, Amit Grover
<span title="2014-06-18">2014</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
With this growing popularity, the security of wireless network is also very important.  ...  The analysis shows that SHA-1 is more secure that CRC-32.  ...  Refer ences Index Terms Computer Science Security Keywords Encryption Decryption Dictionary attack Throughput -Maocai Wang, Guangming Dai, Hanping Hu, Lei Pen &quot;Security Analysis for IEEE802. 11&  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/16885-6896">doi:10.5120/16885-6896</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p7z7vutni5cr7ee2j5nfestzoa">fatcat:p7z7vutni5cr7ee2j5nfestzoa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710090242/https://www.ijcaonline.org/archives/volume96/number17/16885-6896?format=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/fa/6dfa7a15b51edc2fbc586009c6a40c9d3af422a6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/16885-6896"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure two-party k-means clustering

Paul Bunn, Rafail Ostrovsky
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 14th ACM conference on Computer and communications security - CCS &#39;07</a> </i> &nbsp;
efficiency security architecture for protecting integrity and privacy of software,Journal of Parallel and Distributed Computing, Volume 66 , ,Issue 9 (September 2006),Special issue: Security in grid  ...  "Query optimization in XML structured-document databases" Journal of The International Journal on Very Large Data Bases. pp.270-274. Volume 15, Issue 3. sep 2006. Paper 3: Qi Yu, Athman Bouguettaya.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1315245.1315306">doi:10.1145/1315245.1315306</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BunnO07.html">dblp:conf/ccs/BunnO07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hv3vdom7kfhp7llmhvsvmdierm">fatcat:hv3vdom7kfhp7llmhvsvmdierm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121114193740/http://www.cse.unt.edu/~jhoh/F2012/5350/DB_list_S10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/85/5e857756c54675bc2a355ac4d4fed442fe9f2919.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1315245.1315306"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Security and Privacy in Mobile Cloud Computing

<span title="2019-08-23">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
As of late the Smartphone has encountered basic inventive movements yet in the meantime remains a low computational substance.  ...  Versatile Cloud Computing is the most basic fields with creating age of the present fast web utilizing and Mobile world close-by its uses it needs to goes facing a fragment of the issues.  ...  ,Comparison of two multi-classification approaches for detecting network attacks,World Applied Sciences Journal,V-27,I-11,PP-1461-1465,Y-2013 [11] Tariq J., Kumaravel A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.i3258.0789s319">doi:10.35940/ijitee.i3258.0789s319</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g7fkhpeqdvfk3hysrrq3qdj6o4">fatcat:g7fkhpeqdvfk3hysrrq3qdj6o4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210413234109/https://www.ijitee.org/wp-content/uploads/papers/v8i9S3/I32580789S319.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/b6/b6b674726f93c5e5d27f7cbd134d750f7a212ca7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.i3258.0789s319"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Top 10 Cloud Computing Papers: Recommended Reading – Advanced Computing Research

Abdullah Alshwaier
<span title="2018-07-17">2018</span> <i title="Zenodo"> Zenodo </i> &nbsp;
The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc.  ...  Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing.  ...  KEYWORDS Cloud Computing, Privacy Regulations, Privacy Issues, Security Issues For more details : http://airccse.org/journal/acij/papers/0312acij16.pdf Volume Link : http://airccse.org/journal/acij/vol3  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1313605">doi:10.5281/zenodo.1313605</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xghtvwqw2zga3d74pjbvuvjn7u">fatcat:xghtvwqw2zga3d74pjbvuvjn7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201224112550/https://zenodo.org/record/1313605/files/TOP%2010%20CLOUD%20COMPUTING%20PAPERS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/2b/b52bea62ac0886fef4de5dfb129e1b074f4f3891.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1313605"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Page 1698 of Mathematical Reviews Vol. , Issue 84d [page]

<span title="">1984</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
Chapter 3 presents a survey of the security problems which arise in the use of time-shared and networked digital computers.  ...  Finally, a number of protocols which are used to achieve levels of security in computer systems and the emerging theory surrounding cryptographic protocols are presented in Chapter 4.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_1984-04_84d/page/1698" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_1984-04_84d/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Big Data and Cloud Computing Issues

Awodele .O, Izang A.A., Kuyoro S.O, Osisanwo F.Y
<span title="2016-01-15">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
rate of cloud computing by organizations.  ...  Cloud computing on the other hand helps in tackling the issue of storage and data service.  ...  International Journal of Computer Applications (0975 -8887) Volume 133 -No.12, January 2016 Cloud computing simply performs a desired computation (mostly on big data) on a remote server that a subscriber  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016907861">doi:10.5120/ijca2016907861</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4zgzsnqugfeibmwc6dgmvcqrs4">fatcat:4zgzsnqugfeibmwc6dgmvcqrs4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602161209/https://www.ijcaonline.org/research/volume133/number12/.o-2016-ijca-907861.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fd/7f/fd7fce697d00933cb03b9bea337410c257c126ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016907861"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 293,568 results