… Arjun et al. [5] 2012 ECC and ECDH key ✓ exchange algorithm Sameeh [6] 2013 IBC with the Trusted Cloud ✓ ✓ (TC) and AES algorithm Nagendra et al. 2014 RSA and SHA1 algorithms ✓ ✓ ✓ [7] Sudhansu et al. 2014 RSA and MD5 algorithms ✓ ✓ ✓ [8] Nikhil et al …
CITATION STYLE
Maryoosh, A. A., Mohammed, R. S., & Mustafa, R. A. (2019). Subject Review: Cloud Computing Security Based on Cryptography. International Journal of Engineering Research and Advanced Technology, 05(09), 20–23. https://doi.org/10.31695/ijerat.2019.3569
Mendeley helps you to discover research relevant for your work.