1.
Adesh V. Bhabad1 , Vasant N. Dhatrak2 , Jeevan R. Heda3 ,Gaurav P. Shahane4 , Bajirao S. Shirole5. Data Confidentiality and Security in Cloud Computing Using KIST Algorithm. ijetst [Internet]. 2016May31 [cited 2024Jul.1];3(05):3831-7. Available from: https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/1058