Issue | Title | |
Vol 26, No 1 (2017) | Data Security in Cloud Computing with Elliptic Curve Cryptography | Abstract PDF |
Abdulkadir Abdullahi Ibrahim, Dr. Wilson Cheruiyot, Dr. Michael W. Kimwele | ||
Vol 26, No 1 (2017) | Autonomic Cloud Computing: A Review | Abstract PDF |
Yazid Ado Ibrahim, Alhassan Adamu, Salisu Mamman Abdulrahman, Akilu Rilwan Muhammad | ||
Vol 22, No 1 (2016) | Cloud Computing Privacy Concerns in Social Networks | Abstract PDF |
Naif Ali Almudawi | ||
Vol 18, No 1 (2015) | Resource management improvement in cloud computing | Abstract |
G. Jayasurya | ||
Vol 18, No 1 (2015) | Ensuring Data Security in Cloud Computing Using Huffman Encryption | Abstract |
Karmen Biswas | ||
Vol 30, No 1 (2018) | Using Computing Containers and Continuous Integration to Improve Numerical Research Reproducibility | Abstract PDF |
Alexey Vasyukov, Igor Petrov | ||
Vol 8, No 1 (2013) | Ensuring Data Security in Cloud Computing Using encryption | Abstract |
Karmen Biswas | ||
Vol 28, No 1 (2018) | Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions | Abstract PDF |
Geeta C M, Raghavendra S, Rajkumar Buyya, Venugopal K R, S S Iyengar, L M Patnaik | ||
1 - 8 of 8 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"