Return to Article Details
A secure deduplication scheme for encrypted data
Download
Download PDF