DOI:10.20894/IJWT. Periodicity: Bi Annual. Impact Factor: SJIF:4.78 & GIF:0.428 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Panford, "International Journal of Emerging Technology and Advanced Engineering", Mitigation Techniques to Security Flaws in Cloud C ,Vol.5 ,Issue 6 ,2015 View Artical
Muhammad Kazim, Shao Ying Zhu, University of Derby, UK, "A survey on top security threats in cloud computing", International International Journal of Advanced Co ,Vol.6 ,2015 View Artical
Vineet Kumar Singh, "Analyzing cryptographic algorithms for secure cloud network", International Journal of advanced studies in Compu ,Vol.3 ,Issue 6 ,2014 View Artical
Surbhi Aggarwal, "A review of Comparative Study of MD5 and SHA Security Algorithm", International Journal of Computer Applications ,Vol.104 ,2014 View Artical
Shelveen Pandey, Mohammed Farik, "Cloud Computing Security: Latest Issues & Countermeasures", International Journal of Scientific & Technology R ,Vol.4 ,Issue 11 ,2015 View Artical
Prof.Rajesh Kumar Kashyap, "Security challenges and issues in Cloud Computing ? The way ahead", International Journal of Innovative Research in Ad ,Vol.2 ,Issue 9 View Artical
Shraddha More & Rajesh Bansode, "Implementation of AES with Time Complexity Measurement for Various Input View Artical
, "Global Journal of Computer Science and Technology: ENetwork, Web & Security ,Vol.15 ,Issue 4 ,2015 View Artical
Noura Aleisa, "A Comparison of the 3DES and AES Encryption Standards", International Journal of Security and Its Applicat ,2015 View Artical
Krunal Suthar, Parmalik Kumar, Hitesh Gupta & Hiren Patel, "Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment", International Journal of Computer Applications ,Vol.60 ,2012 View Artical
Dr. Prerna Mahajan ? & Abhishek Sachdeva, "A Study ofEncryption Algorithms AES, DES and RSA for Security", Global Journal of Computer Science and Technology ,Vol.13 ,Issue 15 ,2013 View Artical
, "TowardsSecuring APIs in Cloud Computing", International Journal of Computer Engineering & Ap ,Vol.2 ,Issue 2 View Artical
Panford, "International Journal of Emerging Technology and Advanced Engineering", Mitigation Techniques to Security Flaws in Cloud C ,Vol.5 ,Issue 6 ,2015 View Artical
Muhammad Kazim, Shao Ying Zhu, University of Derby, UK, "A survey on top security threats in cloud computing", International International Journal of Advanced Co ,Vol.6 ,2015 View Artical
Vineet Kumar Singh, "Analyzing cryptographic algorithms for secure cloud network", International Journal of advanced studies in Compu ,Vol.3 ,Issue 6 ,2014 View Artical
Surbhi Aggarwal, "A review of Comparative Study of MD5 and SHA Security Algorithm", International Journal of Computer Applications ,Vol.3 ,Issue 6 ,2014 View Artical
Shelveen Pandey, Mohammed Farik, "Cloud Computing Security: Latest Issues & Countermeasures", International Journal of Scientific & Technology R ,Vol.4 ,Issue 11 ,2015 View Artical
Prof.Rajesh Kumar Kashyap, "Security challenges and issues in Cloud Computing ? The way ahead", International Journal of Innovative Research in Ad ,Vol.9 ,Issue 2 View Artical
Shraddha More & Rajesh Bansode, "Implementation of AES with Time Complexity Measurement for Various Input", IET Digital Library ,Issue 152 ,2005 View Artical
Noura Aleisa, "A Comparison of the 3DES and AES Encryption Standards", International Journal of Security and Its Applicat ,Vol.9 ,Issue 7 ,2015 View Artical
Dr. Prerna Mahajan ? & Abhishek Sachdeva, "A Study ofEncryption Algorithms AES, DES and RSA for Security", Global Journal of Computer Science and Technology ,Vol.13 ,Issue 15 ,2013 View Artical
, "TowardsSecuring APIs in Cloud Computing", International Journal of Computer Engineering & Ap ,Vol.2 ,Issue 2 View Artical
Vineet Kumar Singh, "Analyzing cryptographic algorithms for secure cloud network", International Journal of advanced studies in Compu ,Vol.3 ,Issue 6 ,2014 View Artical
Prof.Rajesh Kumar Kashyap, "Security challenges and issues in Cloud Computing ? The way ahead", International Journal of Innovative Research in Ad ,Vol.2 ,Issue 9 View Artical
Noura Aleisa, "A Comparison of the 3DES and AES Encryption Standards", International Journal of Security and Its Applicat ,2015 View Artical