Enforcing security in cloud environment using elliptic curve cryptography and third party auditing

Authors

  • Latha K

How to Cite

K, L. (2018). Enforcing security in cloud environment using elliptic curve cryptography and third party auditing. International Journal of Engineering and Technology, 7(1.7), 84-86. https://doi.org/10.14419/ijet.v7i1.7.9580

Received date: February 17, 2018

Accepted date: February 17, 2018

Published date: February 5, 2018

DOI:

https://doi.org/10.14419/ijet.v7i1.7.9580

Abstract

This paper has been withdrawn.

Downloads

How to Cite

K, L. (2018). Enforcing security in cloud environment using elliptic curve cryptography and third party auditing. International Journal of Engineering and Technology, 7(1.7), 84-86. https://doi.org/10.14419/ijet.v7i1.7.9580

Received date: February 17, 2018

Accepted date: February 17, 2018

Published date: February 5, 2018