Search
Now showing items 1-2 of 2
Addition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud Computing
(JOOUST, 2019)
Cloud computing is a technological paradigm that enables computer users to access computing applications and services on a pay-as-you-use model. Over the years, the adoption of cloud computing by cloud service providers ...
A Stratified Cyber Security Vigilance Model for Corporate Information Technology Infrastructure
(JOOUST, 2019-06)
Cyberspace is a relatively new unavoidable battlefield for most organizations- businesses governments, security agencies, learning and research institutions, political parties, terrorist groups and many others. As a result ...