-
21
Keystroke dynamic authentication in mobile cloud computing /
Publicado 2014Subjects: “...Cloud computing...”
-
22
Keystroke dynamic authentication in mobile cloud computing [electronic resource] /
Publicado 2014Subjects: “...Cloud computing...”
-
23
Authentication and authorization in cloud computing using kerberos /
Publicado 2014Subjects: “...Cloud computing...”
-
24
Authentication and authorization in cloud computing using kerberos [electronic resource] /
Publicado 2014Subjects: “...Cloud computing...”
-
25
The factors that influence on adoption of cloud computing for small and medium enterprises /
Publicado 2014Subjects: “...Cloud computing...”
-
26
The factors that influence on adoption of cloud computing for small and medium enterprises [electronic resource] /
Publicado 2014Subjects: “...Cloud computing...”
-
27
-
28
The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice /
Publicado 2014Subjects: “...Cloud computing....”
-
29
A novel image authenticationand rightful ownership detection framework based on DWT watermarking in cloud environment /
Publicado 2013Subjects: “...Cloud computing...”
-
30
A novel image authenticationand rightful ownership detection framework based on DWT watermarking in cloud environment [electronic resource] /
Publicado 2013Subjects: “...Cloud computing...”
-
31
Resource optimization and security for cloud services /
Publicado 2014Subjects: “...Cloud computing...”
-
32
Client to client attacks protection in cloud computing by a secure virtualization model /
Publicado 2013Subjects: “...Cloud computing...”
-
33
Client to client attacks protection in cloud computing by a secure virtualization model [electronic resource] /
Publicado 2013Subjects: “...Cloud computing...”
-
34
A model to enhance security of live virtual machine migration in cloud computing /
Publicado 2013Subjects: “...Cloud computing...”
-
35
A model to enhance security of live virtual machine migration in cloud computing [electronic resource] /
Publicado 2013Subjects: “...Cloud computing...”
-
36
A novel trusted base model for cloud computing using federated identity architecture against identity theft /
Publicado 2013Subjects: “...Cloud computing...”
-
37
A novel trusted base model for cloud computing using federated identity architecture against identity theft [electronic resource] /
Publicado 2013Subjects: “...Cloud computing...”
-
38
Migrating on -premises application to windows azure platform (microsoft cloud) /
Publicado 2013Subjects: “...Cloud computing...”
-
39
Migrating on -premises application to windows azure platform (microsoft cloud) [electronic resource] /
Publicado 2013Subjects: “...Cloud computing...”
-
40