[1]
Ashima Mehta and S. N. Panda 2016. Comparative Analysis of Cloud Simulators and Authentication Techniques in Cloud Computing. Journal on Today’s Ideas - Tomorrow’s Technologies. 4, 2 (Dec. 2016), 181–191. DOI:https://doi.org/10.15415/jotitt.2016.42010.