To search, Click below search items.
All Published Papers Search Service
Title
Authentication Techniques in Cloud and Mobile Cloud Computing
Author
Mahamudul Hasan, Md. Hasnat Riaz, Md. Auhidur Rahman
Vol. 17 No. 11 pp. 28-39
Keywords
Could Computing, Mobile Cloud computing, Authentication, Confidentiality, Integrity.
Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System
Richard Mnyawi, Cleverence Kombe, Anael Sam, and Devotha Nyambo
Vol. 22 No. 3 pp. 364-374
Blockchain; Hyperledger Fabric; data storage security architecture; confidentiality; integrity.