共 50 条
- [42] Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP [J]. PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 1 - 4
- [44] Intelligent Cloud Training System based on Edge Computing and Cloud Computing [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1550 - 1553
- [45] Threshold Cryptography Based Data Security in Cloud Computing [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
- [46] The Research Based on Security Model and Cloud Computing Strategy [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
- [47] Security Framework for Agent-Based Cloud Computing [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
- [48] Research on the Data Storage Security based on Cloud Computing [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
- [49] Agent Based Security for Cloud Computing using Obfuscation [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 125 - 129
- [50] Construction of Digital Campus Security Based on Cloud Computing [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 573 - 576