1.
K L. Enforcing security in cloud environment using elliptic curve cryptography and third party auditing. IJET [Internet]. 2018 Feb. 5 [cited 2025 May 13];7(1.7):84-6. Available from: https://mail.sciencepubco.com/index.php/IJET/article/view/9580