[1]
K. V. V. Satyanarayana, J. Mahathi, V. V. R. Srikar, and S. Sai Babu, “Different access control methods with revocationin multi-authority cloud”, IJET, vol. 7, no. 1.1, pp. 322–325, Dec. 2017, doi: 10.14419/ijet.v7i1.1.9713.