1.
K L. Enforcing security in cloud environment using elliptic curve cryptography and third party auditing. IJET [Internet]. 2018 Feb. 5 [cited 2024 Nov. 22];7(1.7):84-6. Available from: https://sciencepubco.com/index.php/ijet/article/view/9580