Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Figure 3

Data flow of downloading process.