[1]
R. Chandran and D. A. Sasi Kumar, “Keyless signature infrastructure solution for cloud attacks”, IJET, vol. 7, no. 2.33, pp. 513–514, Jun. 2018, doi: 10.14419/ijet.v7i2.33.14822.