Cloud security architecture based on user authentication and symmetric key cryptographic techniques
Clicks: 171
ID: 23840
2018
Article Quality & Performance Metrics
Overall Quality
Improving Quality
0.0
/100
Combines engagement data with AI-assessed academic quality
Reader Engagement
Star Article
79.2
/100
169 views
137 readers
Trending
AI Quality Assessment
Not analyzed
Abstract
Abstract is not available for this article.
Login to Search Abstract
| Reference Key |
wani2018cloud2017
Use this key to autocite in the manuscript while using
SciMatic Manuscript Manager or Thesis Manager
|
|---|---|
| Authors | Wani, A. |
| Journal | 2017 6th international conference on reliability, infocom technologies and optimization: trends and future directions, icrito 2017 |
| Year | 2018 |
| DOI |
10.1109/ICRITO.2017.8342485
|
| URL | |
| Keywords | Keywords not found |
Citations
No citations found. To add a citation, contact the admin at info@scimatic.org
Comments
No comments yet. Be the first to comment on this article.