Publication:
Comprehensive evaluation of key management hierarchies for outsourced data

dc.contributor.affiliationDA-IICT, Gandhinagar
dc.contributor.authorKumar, Naveen
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.contributor.authorMathuria, Anish
dc.date.accessioned2025-08-01T13:09:17Z
dc.date.issued01-12-2019
dc.format.extent1-17
dc.identifier.citationKumar, Naveen, and Mathuria, Anish"Comprehensive evaluation of key management hierarchies for outsourced data," Cybersecurity, vol. 2, no. 2, Dec. 2019, pp. 1-17, Springer. Doi: 10.1186/s42400-019-0026-y | PDF
dc.identifier.doihttps://doi.org/10.1186/s42400-019-0026-y
dc.identifier.issn2523-3246
dc.identifier.scopus2-s2.0-85089698997
dc.identifier.urihttps://ir.daiict.ac.in/handle/dau.ir/1798
dc.publisherSpringer
dc.relation.ispartofseriesVol. 2; No. 2
dc.source Cybersecurity
dc.source.urihttps://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0026-y
dc.titleComprehensive evaluation of key management hierarchies for outsourced data
dspace.entity.typePublication
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication.latestForDiscovery078fff3e-c9c9-46b3-b171-66587e178807

Files

Collections