(1)
K, L. Enforcing Security in Cloud Environment Using Elliptic Curve Cryptography and Third Party Auditing. IJET 2018, 7 (1.7), 84-86. https://doi.org/10.14419/ijet.v7i1.7.9580.