←
Return to Article Details
Secure Data Management in Cloud Computing Environments: A Deduplication Approach
Download