The secured data provenance: Background and application oriented analysis
- Title
- The secured data provenance: Background and application oriented analysis
- Description
- 2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings pp.1212-1216
- Creator
- Kumar K.P.; Cherukuri R.C.
- Source
- <a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015052674&doi=10.1109%2fRTEICT.2016.7808024&partnerID=40&md5=5168da07b9e3a54f85ce6fca6c76c7d8" target="_blank" rel="noreferrer noopener">https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015052674&doi=10.1109%2fRTEICT.2016.7808024&partnerID=40&md5=5168da07b9e3a54f85ce6fca6c76c7d8</a>
- Date
- 2017-01-01
Collection
Citation
Kumar K.P.; Cherukuri R.C., “The secured data provenance: Background and application oriented analysis,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 8, 2025, https://archives.christuniversity.in/items/show/11279.