Publication: Comprehensive evaluation of key management hierarchies for outsourced data
dc.contributor.affiliation | DA-IICT, Gandhinagar | |
dc.contributor.author | Kumar, Naveen | |
dc.contributor.author | Mathuria, Anish | |
dc.contributor.author | Mathuria, Anish | |
dc.contributor.author | Mathuria, Anish | |
dc.contributor.author | Mathuria, Anish | |
dc.contributor.author | Mathuria, Anish | |
dc.contributor.author | Mathuria, Anish | |
dc.date.accessioned | 2025-08-01T13:09:17Z | |
dc.date.issued | 01-12-2019 | |
dc.format.extent | 1-17 | |
dc.identifier.citation | Kumar, Naveen, and Mathuria, Anish"Comprehensive evaluation of key management hierarchies for outsourced data," Cybersecurity, vol. 2, no. 2, Dec. 2019, pp. 1-17, Springer. Doi: 10.1186/s42400-019-0026-y | PDF | |
dc.identifier.doi | https://doi.org/10.1186/s42400-019-0026-y | |
dc.identifier.issn | 2523-3246 | |
dc.identifier.scopus | 2-s2.0-85089698997 | |
dc.identifier.uri | https://ir.daiict.ac.in/handle/dau.ir/1798 | |
dc.publisher | Springer | |
dc.relation.ispartofseries | Vol. 2; No. 2 | |
dc.source | Cybersecurity | |
dc.source.uri | https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0026-y | |
dc.title | Comprehensive evaluation of key management hierarchies for outsourced data | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 078fff3e-c9c9-46b3-b171-66587e178807 | |
relation.isAuthorOfPublication | 078fff3e-c9c9-46b3-b171-66587e178807 | |
relation.isAuthorOfPublication | 078fff3e-c9c9-46b3-b171-66587e178807 | |
relation.isAuthorOfPublication | 078fff3e-c9c9-46b3-b171-66587e178807 | |
relation.isAuthorOfPublication.latestForDiscovery | 078fff3e-c9c9-46b3-b171-66587e178807 |