[1]
S. Shukla and N. Joshi, “Solving BYOD Privacy Issues with Multi-Level Authenticated Encryption”, theijst, vol. 3, no. 8, Aug. 2015.