Xiaogong Han

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
We discuss about cloud security. Because cloud computing service users must submit almost their entire store of data and programs to a certain cloud provider, they cannot escape from anxiety about the possibility of data and programs being abused or leaked. Those data and programs usually embody the entirety of a company's stored knowledge. We have studied(More)
  • 1