[1]
L. K, “Enforcing security in cloud environment using elliptic curve cryptography and third party auditing”, IJET, vol. 7, no. 1.7, pp. 84–86, Feb. 2018, doi: 10.14419/ijet.v7i1.7.9580.