Return to Article Details Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing Download Download PDF