Cited By
View all- Gautham HP D(2021)A Systematic Approach for a Secure Authentication SystemInternational Journal of Soft Computing and Engineering10.35940/ijsce.F3508.071062110:6(7-11)Online publication date: 30-Jul-2021
- Rubio-Medrano CZhao ZAhn GBertino ESandhu RKrishnan R(2018) RiskPol Proceedings of the Third ACM Workshop on Attribute-Based Access Control10.1145/3180457.3180462(54-60)Online publication date: 14-Mar-2018
- Dorri Nogoorani SJalili R(2016)TIRIACFuture Generation Computer Systems10.1016/j.future.2015.03.00355:C(238-254)Online publication date: 1-Feb-2016
- Show More Cited By