[1]
V. Pal, P. Chowdary, and P. Gaur, “A Review of Security Algorithms in Cloud Computing”, theijst, vol. 4, no. 10, Oct. 2016.