1 |
Amazon, [Online], Available: http://www.amazon.com,
|
2 |
Y. Cho, Y. Seo, and Y. Kim, "The cloud computing service and the advanced network," in Proc. KICS Fall Conf., pp. 158-159, Seoul, Korea, Nov. 2010.
|
3 |
U. Berger, CSI/FBI Computer Crime and Security Survey. 2011-2012, Retrieved April, 28, 2011, from http://gocsi.com.
|
4 |
Microsoft, Windows bitlocker drive encryption frequently asked questions, Retrieved April, 30, 2009, from http://technet.microsoft.com/enus/library/cc766 200(WS.10).aspx
|
5 |
I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and Grid computing 360-degree compared," in Proc. Grid Comput. Environment Workshop(GCE'08), pp. 1-10, Austin, U.S.A., Nov. 2008.
|
6 |
NBS, "Data Encryption Standard. Federal Information Processing Standard Pub," 1977
|
7 |
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
DOI
ScienceOn
|
8 |
Shamir's Secret Sharing Scheme, [Online], Available: http://point-at-infinity.org/ssss,
|
9 |
N. Zhang, J. Jing, and P. Liu, "CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era," in Proc. IEEE Int. Conf. Security and Privacy Comput. Commun., pp. 16-18, Changsha, China, Nov. 2011.
|
10 |
A. Zonenberg, "Distributed hash cracker: A cross-platform GPU-accelerated password recovery system," Rensselaer Polytechnic Institute, Apr. 2009.
|
11 |
Dropbox, [Online], Available: https://www.dropbox.com,
|