Abstract
Outsourcing services to third-party providers comes with a high security cost-to fully trust the providers. Using trusted hardware can help, but curre......
小提示:本篇文献需要登录阅读全文,点击跳转登录