Return to Article Details
Analysis of data search methods in cryptographically protected databases.
Download
Download PDF