Return to Article Details Secured And Efficient Data Duplication With Re-Encryption Techniques Download Download PDF