Network and Communication Technologies, Vol. 2, No. 2, 2013, e-Version First TM
Table of Contents
|Network Security in Cloud Computing with Elliptic Curve Cryptography
Victor O. Waziri, Ojeniyi J. Adebayo, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, Muhammad Bashir Abdullahi
This work is licensed under a Creative Commons Attribution 3.0 License
Network and Communication Technologies ISSN 1927-064X(Print) ISSN 1927-0658 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.