1.
Sumathi D, Jasti S. Review on authentication mechanisms in cloud computing. IJET [Internet]. 2018 Aug. 24 [cited 2024 Apr. 28];7(3.29):319-22. Available from: https://www.sciencepubco.com/index.php/ijet/article/view/19184