Disguising access patterns to protect sensitive data in the cloud
A team of computer scientists is working to defend against the next potential cyber risk – cloud storage.
A team of computer scientists is working to defend against the next potential cyber risk – cloud storage.