[1]
N. P. C. M. K. M. V., “Data Security in Cloud Computing Using Threshold Cryptography and User Revocation”, IJRITCC, vol. 4, no. 6, pp. 293–297, Jun. 2016.