1.
DVKG. Different Approach to Secure Data with Fog Computing. ijfrcsce [Internet]. 2018Mar.31 [cited 2024May5];4(3):595-7. Available from: http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/1368