E. Bernstam, J. Herskovic, Y. Aphinyanaphongs, C. Aliferis, M. Sriram, and W. Hersh. Journal of the American Medical Informatics Association : JAMIA, 13 (1):
96-105(January 2006)LR: 20061115; PUBM: Print-Electronic; GR: 5 K22 LM008306/LM/NLM; DEP: 20051012; JID: 9430800; 2005/10/12 aheadofprint; 2005/10/14 aheadofprint; ppublish.
P. Royle, L. Bain, and N. Waugh. BMC medical research methodology, 5 (1):
2(January 2005)LR: 20061115; PUBM: Electronic; DEP: 20050108; JID: 100968545; 2004/08/11 received; 2005/01/08 accepted; 2005/01/08 aheadofprint; epublish.
S. Golder, H. McIntosh, and Y. Loke. BMC medical research methodology, (May 2006)PUBM: Electronic; DEP: 20060508; JID: 100968545; 2005/10/18 received; 2006/05/08 accepted; 2006/05/08 aheadofprint; epublish.
M. Shah, and S. Pathak. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI):
01-04(November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..
A. Bishop, and L. Neumann. Journal of the American Society for Information Science, 51 (4):
394-413(March 2000)M3: Article; Bishop, Ann Peterson Neumann, Laura J.; Source Info: Mar2000, Vol. 51 Issue 4, p394; Subject Term: INFORMATION storage & retrieval systems; Subject Term: DIGITAL libraries; Subject Term: ILLINOIS; Subject Term: UNITED States; NAICS/Industry Codes: 519120 Libraries and Archives; Number of Pages: 20p; Illustrations: 6 charts, 1 diagram; Document Type: Article.
P. Royle, and N. Waugh. BMC medical research methodology, (July 2005)LR: 20061115; PUBM: Electronic; DEP: 20050723; JID: 100968545; 2005/02/05 received; 2005/07/23 accepted; 2005/07/23 aheadofprint; epublish.