Return to Article Details Analysis of data search methods in cryptographically protected databases. Download Download PDF