Cryptographic Techniques for Securing Data in the Cloud

 

Files in this item

This item appears in the following Collections