[1]
S. Buchade and P. Devale, “A study on searchable encryption schemes”, IJET, vol. 7, no. 2, pp. 617–620, Apr. 2018, doi: 10.14419/ijet.v7i2.10995.