[1]
K, L. 2018. Enforcing security in cloud environment using elliptic curve cryptography and third party auditing. International Journal of Engineering & Technology. 7, 1.7 (Feb. 2018), 84–86. DOI:https://doi.org/10.14419/ijet.v7i1.7.9580.