Return to Article Details SECURE DEDUPLICATION WITH CONVERGENT ENCRYPTION KEY MANAGEMENT Download Download PDF