Abstract: Existing secure data outsourcing systems offer users ways to select from different cryptographic primitives supported by the system to encrypt their data to strike a balance between data ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results