New approach for ensuring cloud computing security: using data hiding methods
Crossref DOI link: https://doi.org/10.1007/s12046-016-0558-8
Published Online: 2016-11-03
Published Print: 2016-11
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Yesilyurt, Murat
Yalman, Yildiray
Text and Data Mining valid from 2016-11-01
Article History
Received: 1 April 2015
Revised: 11 May 2016
Accepted: 16 May 2016
First Online: 3 November 2016