[1]
S. H. L. Kanickam and . L. Jayasimman, “Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data”, AJCST, vol. 8, no. 1, pp. 53–61, Feb. 2019.