[1]
“A Survey on Encryption and Improved Virtualization Security Techniques for Cloud Infrastructure”, GJCST, vol. 14, no. B2, pp. 1–4, May 2014, Accessed: Feb. 04, 2026. [Online]. Available: https://testing.computerresearch.org/index.php/computer/article/view/63