Return to Article Details An Efficient Authentication Approach with Optimization Algorithms and Elliptical Curve Cryptography for Cloud Environment Download Download PDF