Tenant duplicates data obfuscation model by line hidden
LI Lin1, DING Yanhui2, ZHANG Yongxin1, ZHAO Xiaohui1
Computer Engineering and Applications . 2018, (22): 10 -15 .  DOI: 10.3778/j.issn.1002-8331.1809-0174