[1]
M. A. Shinde and J. S. Ramesh, “Mobile Cloud Computing Authentication: Methods and Techniques with Capabilities, Limitations”, Int. J. Comp. Sci. Eng., vol. 6, no. 12, pp. 547–552, Dec. 2018.