[1]
Ashima Mehta and S. N. Panda, “Comparative Analysis of Cloud Simulators and Authentication Techniques in Cloud Computing”, J. Today’s Ideas - Tomorrow’s Technol. , vol. 4, no. 2, pp. 181–191, Dec. 2016.