[1]
R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security: A survey”,
IJET
, vol. 7, no. 1.5, pp. 107–110, Dec. 2017,
doi: 10.14419/ijet.v7i1.5.9130.