1.
Adesh V. Bhabad1 , Vasant N. Dhatrak2 , Jeevan R. Heda3 ,Gaurav P. Shahane4 , Bajirao S. Shirole5. Data Confidentiality and Security in Cloud Computing Using KIST Algorithm. ijetst [Internet]. 2016May31 [cited 2024Nov.23];3(05):3831-7. Available from: http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/1058