[1]
Singh, A. et al. 2018. A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context. International Journal of Engineering & Technology. 7, 2.8 (Mar. 2018), 358–360. DOI:https://doi.org/10.14419/ijet.v7i2.8.10462.