1.
Jain R, Madan S, Garg B. Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment. Int. J. Comp. Sci. Eng. [Internet]. 2015 Jan. 31 [cited 2026 Feb. 2];3(1):130-6. Available from: https://ijcse.isroset.org/index.php/j/article/view/370