[1]
D. V. K. G., “Different Approach to Secure Data with Fog Computing”, ijfrcsce, vol. 4, no. 3, pp. 595–597, Mar. 2018.