Abstract: In the cloud computing environment, the data is encrypted using a variety of cryptographic techniques before being sent to the cloud. But in this method, if someone wants to do some ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results