Return to Article Details To develop cryptographic techniques to test and validate the structure of cloud topologies Download Download PDF