An efficient AES and RC6 based cloud-user data security with attack detection mechanism
2016; Volume: 3; Issue: 21 Linguagem: Inglês
10.19101/ijatee.2016.321007
ISSN2394-7454
AutoresShristi Bhute, Siddhartha Kumar Arjaria,
Tópico(s)Security and Verification in Computing
ResumoThe essential cloud suppliers are Google, Microsoft, Amazon and Salesforce.com.The dispersed figuring advantage show relies on upon the data correspondence layer.
Referência(s)