[1]
A. Singh, S. Shukla, and S. B, “A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context”, IJET, vol. 7, no. 2.8, pp. 358–360, Mar. 2018, doi: 10.14419/ijet.v7i2.8.10462.