Security Scheme in Cloud System Using Hyper Elliptic Curve and SIFT Technique with QR Code
Crossref DOI link: https://doi.org/10.1007/s11277-019-06917-7
Published Online: 2019-11-12
Published Print: 2020-03
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Latha, K.
Sheela, T.
Text and Data Mining valid from 2019-11-12
Version of Record valid from 2019-11-12
Article History
First Online: 12 November 2019