[1]
Amid Khouri, “Different approaches of enhanced data security methods in the internet based cloud computing ”, DE, pp. 335 - 340, Jun. 2020.