1.
Kumar T, Kumar P, Namasudra S. User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment. IJIMAI [Internet]. 2024 Dec. 1 [cited 2025 Nov. 18];9(1):127-36. Available from: https://www.ijimai.org/index.php/ijimai/article/view/280