[1]
R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security: A survey”, IJET, vol. 7, no. 1.5, pp. 107–110, Dec. 2017, doi: 10.14419/ijet.v7i1.5.9130.