Issue Title
Vol 26, No 1 (2017) Data Security in Cloud Computing with Elliptic Curve Cryptography Abstract  PDF
Abdulkadir Abdullahi Ibrahim, Dr. Wilson Cheruiyot, Dr. Michael W. Kimwele
Vol 21, No 1 (2016) In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016) Abstract  PDF
A. Rob Md. Rayhan Hossain, G. M. Israfil Islam, Md. Shahinurzzaman, Md. Alam Hossain
Vol 18, No 1 (2015) Ensuring Data Security in Cloud Computing Using Huffman Encryption Abstract
Karmen Biswas
Vol 8, No 1 (2013) Ensuring Data Security in Cloud Computing Using encryption Abstract
Karmen Biswas
Vol 31, No 1 (2018) The Least Significant Two-bit Substitution Algorithm for Image Steganography Abstract  PDF
Serdar Solak, Umut Altinişik
Vol 31, No 1 (2018) Holistic Approach to Big Data Definition using Analysis of Facts Abstract  PDF
Akande Oyebola, Osofisan Adenike, Adekola Olubukola
Vol 17, No 1 (2015) The Role of Data Mining in Information Security Abstract  PDF
Osman Mohamed Abbas, Mohamed Elhafiz Mustafa, Siddig Balal Ibrahim
1 - 7 of 7 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"