[1]
A. Agrawal and R. Thour, “Comparative Analysis of IECC-QKD with Several Access Control and Security Approaches for Secure Authentication and Data Sharing in Cloud Environments”, JETIA, vol. 12, no. 58, pp. 64-74, Mar. 2026.