[1]
A. Pandey, “A Review of Various Security Techniques in Cloud Computing”, IJAST, vol. 26, no. 2, pp. 44 - 47, Aug. 2019.