Login / Signup

Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication.

Danish AhamadMd Mobin AkhtarShabi Alam HameedMahmoud Mohammad Mahmoud Al Qerom
Published in: Int. J. Electron. Secur. Digit. Forensics (2021)
Keyphrases