[1]
K. K., “A Review of Various Security Techniques in Cloud computing”, ijfrcsce, vol. 4, no. 3, pp. 373–375, Mar. 2018.