[1]
Sunita Kumari, “Encryption and Privacy in Cloud Computing: A Comprehensive Review”, IJESH, vol. 5, no. 1, pp. 06–11, Jan. 2015.