Works matching DE "CLOUD storage security measures"
1
- International Journal of Advanced Research in Computer Science, 2024, v. 15, n. 6, p. 41, doi. 10.26483/ijarcs.v15i6.7162
- Verma, Priyanka;
- Kumar, Pawan
- Article
2
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- Siyal, Reshma;
- Asim, Muhammad;
- Jun, Long;
- Elaffendi, Mohammed;
- Iftikhar, Sundas;
- Alnashwan, Rana;
- Chelloug, Samia Allaoua
- Article
3
- KnE Social Sciences, 2024, p. 335, doi. 10.18502/kss.v9i6.15283
- Arfriandi, Arief;
- Gernowo, Rahmat;
- Isnanto, R Rizal
- Article
4
- Georgia Journal of International & Comparative Law, 2013, v. 41, n. 2, p. 481
- Article
5
- European Data Protection Law Review (EDPL), 2020, v. 6, n. 4, p. 536, doi. 10.21552/edpl/2020/4/9
- Cepic, Michael;
- Rissetto, Mariana
- Article
6
- Iraqi Journal of Science, 2023, v. 64, n. 5, p. 2492, doi. 10.24996/ijs.2023.64.5.33
- Khudaier, Sozan Mohammed;
- Mahmood, Baban Ahmed
- Article
7
- Journal of Cloud Computing (2192-113X), 2018, v. 7, n. 1, p. 1, doi. 10.1186/s13677-018-0109-4
- Abusitta, Adel;
- Bellaiche, Martine;
- Dagenais, Michel
- Article
8
- Computer Journal, 2016, v. 59, n. 11, p. 1593, doi. 10.1093/comjnl/bxw019
- LAN ZHOU;
- VARADHARAJAN, VIJAY;
- GOPINATH, K.
- Article
9
- Quantum Information Processing, 2022, v. 21, n. 3, p. 1, doi. 10.1007/s11128-022-03452-6
- Sundar, K.;
- Sasikumar, S.;
- Jayakumar, C.
- Article
10
- International Journal of Knowledge Based Computer Systems, 2017, v. 5, n. 1, p. 8
- Sivranjani, N.;
- Ramaraj, E.
- Article
11
- Applied Sciences (2076-3417), 2025, v. 15, n. 6, p. 3225, doi. 10.3390/app15063225
- Eren, Haluk;
- Karaduman, Özgür;
- Gençoğlu, Muharrem Tuncay
- Article
12
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-023-00587-4
- Article
13
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00523-6
- Article
14
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00442-6
- Suganya, M.;
- Sasipraba, T.
- Article
15
- Entropy, 2023, v. 25, n. 4, p. 616, doi. 10.3390/e25040616
- Li, Juyan;
- Fan, Ye;
- Bian, Xuefen;
- Yuan, Qi
- Article
16
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 283
- Article
17
- Journal of Management Information Systems, 2024, v. 41, n. 1, p. 206, doi. 10.1080/07421222.2023.2301177
- Li, He;
- Kettinger, William J.;
- Yoo, Sungjin
- Article
19
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 81, doi. 10.5958/0974-0945.2023.00008.7
- Article
20
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 2
- Article
21
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/9691724
- Xie, Zhenjie;
- Fu, Wei;
- Xu, Jianqiao;
- Zhu, Tingting
- Article
22
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 23, p. 7685, doi. 10.1007/s00500-018-3224-8
- Wu, Libing;
- Chen, Biwen;
- Zeadally, Sherali;
- He, Debiao
- Article
23
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 1759, doi. 10.1007/s11277-023-10354-y
- Sehgal, Shravan Kumar;
- Gupta, Rashmi
- Article
24
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 755, doi. 10.1007/s11277-021-08924-z
- Kaliyamoorthy, Priyadharshini;
- Ramalingam, Aroul Canessane
- Article
25
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3079, doi. 10.1007/s11277-018-5995-8
- Senthil kumar, R.;
- Geetha, B. G.
- Article
26
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 12, p. 3714, doi. 10.3969/j.issn.1001-3695.2014.12.050
- Article
27
- Security & Communication Networks, 2023, v. 2023, p. 1, doi. 10.1155/2023/8168075
- Kumar, Narendra;
- Goel, Vikas;
- Ranjan, Raju;
- Altuwairiqi, Majid;
- Alyami, Hashem;
- Asakipaam, Simon Atuah
- Article
28
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2012, v. 10, n. 1, p. 71
- PAL, Shantanu;
- KHATUA, Sunirmal;
- CHAKI, Nabendu;
- SANYAL, Sugata
- Article
29
- Library of Progress-Library Science, Information Technology & Computer, 2024, v. 44, n. 3, p. 6939
- Ivanglin, M. Reena;
- Pragaladan, R.
- Article
30
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 144, doi. 10.15866/irecos.v10i2.5542
- Goyal, Sakshi;
- Singh, Sarbjeet;
- Singh, Makhan
- Article
31
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 130, doi. 10.15866/irecos.v10i2.5236
- Abdellaoui, Abderrahim;
- Khamlichi, Younes Idrissi;
- Chaoui, Habiba
- Article
32
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- Ghadage, Dipali Indrajeet;
- Gavali, Harshal Prabhakar;
- Harikrishna Thodupunooru, Adharva Kumar;
- Powar, Gourav Tukaram;
- Chinchkar, Rohan Dnyandeo
- Article
33
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 622
- Bedse, Akshay;
- Padiya, Puja;
- Vidhate, Amarsinh
- Article
34
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 399
- Ahammed, Nabeel;
- M. S., Gayathy;
- Anil, Anandhu;
- J., Anoop;
- H., Varun Chand
- Article
35
- International Journal of Intelligent Engineering & Systems, 2025, v. 18, n. 4, p. 851, doi. 10.22266/ijies2025.0531.55
- Ameer Hadi, Hend Abdul;
- Ghani, Rana Fareed
- Article
36
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 2, p. 536, doi. 10.22266/ijies2023.0430.44
- Hole, Varsha Pravin;
- Mulla, Nikahat;
- Hole, Pravin Basavraj
- Article
37
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4734, doi. 10.11591/ijece.v13i4.pp4734-4742
- Gadad, Amruta;
- Anbusezhiyan, Devi
- Article
38
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4547, doi. 10.11591/ijece.v13i4.pp4547-4556
- Pongpisit Wuttidittachotti;
- Parinya Natho
- Article
39
- Security & Communication Networks, 2015, v. 8, n. 18, p. 4308, doi. 10.1002/sec.1343
- Article
40
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2211, doi. 10.1002/sec.739
- Article
41
- Security & Communication Networks, 2013, v. 6, n. 5, p. 658, doi. 10.1002/sec.691
- Chen, Liang;
- Han, Lansheng;
- Jing, Jiandu;
- Hu, Dongping
- Article
42
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 2, p. 219, doi. 10.18280/ijsse.150203
- Moudni, Mohammed El;
- Ziyati, Elhoussaine
- Article
43
- Business Law International, 2024, v. 25, n. 3, p. 251
- Wainwright, Paul;
- Katamba, Francis;
- Henderson, David
- Article
44
- IUP Journal of Information Technology, 2024, v. 20, n. 3, p. 35
- Chigozirim, Ajaegbu;
- Josiah, Deshi Shiligak;
- Oluwaseun, Onadeko David;
- Oluwaseyi, Adediran
- Article
45
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2015, v. 38, n. 3, p. 1
- Article
46
- Stanford Law Review, 2017, v. 69, n. 3, p. 867
- Article
47
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61313, doi. 10.1007/s11042-023-17969-0
- Lavanya, M.;
- Sundar, K. Joseph Abraham;
- Saravanan, S.
- Article
48
- Multimedia Tools & Applications, 2023, v. 82, n. 5, p. 7779, doi. 10.1007/s11042-022-13615-3
- Mandal, Sudakshina;
- Khan, Danish Ali
- Article
49
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 24223, doi. 10.1007/s11042-018-5729-7
- Rajput, Amitesh Singh;
- Raman, Balasubramanian
- Article
50
- Journal of Computational Analysis & Applications, 2024, v. 33, n. 8, p. 1261
- Diyyana, Phani Babu;
- Kumar, Pawan
- Article