[1]
K. R. sekhar, Dr. K. Subrahmanyam, “Survey on User Authenticating and Necessary Data Processing without Private Key in Cloud Computing”, IJAST, vol. 29, no. 3, pp. 5611 - 5616, Mar. 2020.