Return to Article Details
Technique for querying over an encrypted database
Download
Download PDF