共 50 条
- [2] A Review: Cryptography and Steganography Algorithm for Cloud Computing PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
- [3] Data Security in Cloud Computing Using Steganography: A Review PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, : 549 - 558
- [4] Scheduling Technique of Data Intensive Application Workflows in Cloud Computing 3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
- [5] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
- [6] APPLICATION STEGANOGRAPHY METHODS OF REPLACEMENT AND INSERTION TECHNIQUE 2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 928 - +
- [7] Application of cloud computing to learning AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 2010, 4 (14): : 3217 - 3225
- [8] Emerging Technique in Libraries: Cloud Computing 2015 4TH INTERNATIONAL SYMPOSIUM ON EMERGING TRENDS AND TECHNOLOGIES IN LIBRARIES AND INFORMATION SERVICES (ETTLIS), 2015, : 29 - 31
- [9] Filtering Technique on Mobile Cloud Computing 2012 INTERNATIONAL CONFERENCE ON FUTURE ENERGY, ENVIRONMENT, AND MATERIALS, PT B, 2012, 16 : 1305 - 1311
- [10] Provisioning Authentication Technique in Cloud Computing 2013 FOURTH INTERNATIONAL CONFERENCE ON EDUCATION AND SPORTS EDUCATION (ESE 2013), PT I, 2013, 11 : 498 - 502