Login / Signup

Secured two factor authentication, graph based replication and encryption strategy in cloud computing.

S. LavanyaN. M. Saravanakumar
Published in: Multim. Tools Appl. (2023)
Keyphrases