72
73
Edición Especial Special Issue Noviembre 2019
DOI: http://dx.doi.org/10.17993/3ctecno.2019.specialissue3.65-75
REFERENCES
Albadri, H., & Sulaiman, R. (2016). A Classication Method for Identifying
Condential Data to Enhance Eciency of Query Processing over Cloud. Journal
of Theoretical and Applied Information Technology, 93 (2), 412-20.
Aman, A.H.M., Hassan, R., Hashim, A.H.A., and Ramli, H.A.M. (2019).
Investigation of Internet of Things Handover Process for Information Centric
Networking and Proxy Mobile Internet Protocol. In 3rd International Multi-Topic
Conference on Engineering and Science 2019.
Amini, R., Sulaiman, R. & Abd Rahman Kurais, A. H. (2018). CryptoROS:
A secure communication architecture for ROS-based applications. International
Journal of Advanced Computer Science and Applications, 9(10), 189-194.
Ibrahim, R., Aman, A. H. M., Nur, A. M., & Aljunid, S. M. (2019). Cost Centric
Data Mining for Radiology Procedures at Teaching Hospital in Malaysia. In 3rd
International Multi-Topic Conference on Engineering and Science 2019.
Ghaleb, H. S. M., Shukur, Z., Sulaiman, R. & Mobidin, H. S. (2018).
Implementation of AES algorithm in QGIS software. Proceedings of the 2017 6th
International Conference on Electrical Engineering and Informatics: Sustainable Society Through
Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol.
2017-November, 1-6.
Gupta, P., Verma, D. K. & Singh, A. K. (2018). Improving RSA Algorithm
Using Multi-Threading Model for Outsourced Data Security in Cloud Storage.
Proceedings of the 8th International Conference Conuence 2018 on Cloud Computing, Data
Science and Engineering, Conuence 2018, 163-69.
Modak, A., Chaudhary, S.D., Paygude, P.S., & Ldate, S.R. (2018). Techniques
to Secure Data on Cloud: Docker Swarm or Kubernetes? 2018 Second International
Conference on Inventive Communication and Computational Technologies (ICICCT), 7-12.