has been cited by the following article(s):
[1]
|
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
Sensors,
2022
DOI:10.3390/s22031109
|
|
|
[2]
|
Research on cloud computing-based power security management software
Journal of Computational Methods in Sciences and Engineering,
2019
DOI:10.3233/JCM-191024
|
|
|
[3]
|
Application of Steganography Technique in Cloud Computing
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE),
2019
DOI:10.1109/ICCIKE47802.2019.9004347
|
|
|
[4]
|
Cloud Computing Technologies for Green Enterprises
Advances in Business Information Systems and Analytics,
2018
DOI:10.4018/978-1-5225-3038-1.ch012
|
|
|
[5]
|
Cyber Security and Threats
2018
DOI:10.4018/978-1-5225-5634-3.ch027
|
|
|
[6]
|
Secret digital images over cloud computing using meaningful secret sharing technique
2017 International Conference on Applied System Innovation (ICASI),
2017
DOI:10.1109/ICASI.2017.7988579
|
|
|
[7]
|
Enhancing image security and privacy in cloud system using steganography
2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW),
2017
DOI:10.1109/ICCE-China.2017.7991125
|
|
|