Subject Review: Cloud Computing Security Based on Cryptography

  • Maryoosh A
  • Mohammed R
  • Mustafa R
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

… Arjun et al. [5] 2012 ECC and ECDH key ✓ exchange algorithm Sameeh [6] 2013 IBC with the Trusted Cloud ✓ ✓ (TC) and AES algorithm Nagendra et al. 2014 RSA and SHA1 algorithms ✓ ✓ ✓ [7] Sudhansu et al. 2014 RSA and MD5 algorithms ✓ ✓ ✓ [8] Nikhil et al …

Cite

CITATION STYLE

APA

Maryoosh, A. A., Mohammed, R. S., & Mustafa, R. A. (2019). Subject Review: Cloud Computing Security Based on Cryptography. International Journal of Engineering Research and Advanced Technology, 05(09), 20–23. https://doi.org/10.31695/ijerat.2019.3569

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free