Return to Article Details
A study on searchable encryption schemes
Download
Download PDF