[1]
J. K. Periasamy and B. Latha, “Secure and duplication detection in cloud using cryptographic hashing method”, IJET, vol. 7, no. 1.7, pp. 105–108, Feb. 2018, doi: 10.14419/ijet.v7i1.7.9585.