(1)
, N. P. C. M. K. M. V. Data Security in Cloud Computing Using Threshold Cryptography and User Revocation. IJRITCC 2016, 4, 293-297.