Return to Article Details An Integrated Cuckoo AES Key Generationapproach with Bilinear Pairing to Detect Malicious Third-Party Auditors in the Cloud Download Download PDF