[1]
V. V. Satyanarayana, K. et al. 2017. Different access control methods with revocationin multi-authority cloud. International Journal of Engineering & Technology. 7, 1.1 (Dec. 2017), 322–325. DOI:https://doi.org/10.14419/ijet.v7i1.1.9713.