Outsourcing Computation on Non-Encrypted SensitiveData to Untrusted Clouds

Files in this item

This item appears in the following Collections