[1]
Sumathi, D. and Jasti, S. 2018. Review on authentication mechanisms in cloud computing. International Journal of Engineering & Technology. 7, 3.29 (Aug. 2018), 319–322. DOI:https://doi.org/10.14419/ijet.v7i3.29.19184.