Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication
Danish Ahamad; Md Mobin Akhtar; Shabi Alam Hameed; Mahmoud Mohammad Mahmoud Al Qerom
International Journal of Electronic Security and Digital Forensics (IJESDF), 2021 Vol.13 No.5, pp.475 - 497
4 + 12 =

Thank you for your feedback.