|
Ochiq kalitli kriptografik algoritmlardan bulutli hisoblash tizimlarida foydalanish
|
bet | 4/4 | Sana | 16.03.2024 | Hajmi | 48.9 Kb. | | #174729 |
Bog'liq Mustaqil ish 6-variant Презентация1, реферат, sasasa, axborot kutubxona muassasalarida axborot kutubxona fondlarini saqlash, N.N.Kolosovskiy kontseptsiyasining kuchli va zaif tomonlari, ALIMBETOVA JAZIRA YELUBAYEVNAREFERENCES
Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360- Degree Compared CoRR. abs/0901.01
Gartener: Seven cloud-computing security risks. InfoWorld.2008-07-02. http://www.infoworld.com/d/security-central/gartener-seven-cloud- computing-securityrisks-853.
Data Remanence, https://en.wikipedia.org/wiki/Data_remanence.
Vijay Kumar, “Brief Review on Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol. 5, September 2016.
Rijndael.Advanced Encryption Standard (AES). FIPS. November 23, 2001. http://csrc.nist.gov/publications/fips/fips197/fips197.pdf
Shraddha Soni, Himani Agrawal , Dr. (Mrs.) Monisha Sharma, “Analysis and Comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012
Aman Kumar, Dr. Sudesh Jakhar, Mr. Sunil Makkar, “Comparative Analysis between DES and RSA Algorithm’s”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012 ISSN: 2277 128X
|
| |