[1]
D. Sumathi and S. Jasti, “Review on authentication mechanisms in cloud computing”, IJET, vol. 7, no. 3.29, pp. 319–322, Aug. 2018, doi: 10.14419/ijet.v7i3.29.19184.