Return to Article Details
Features of software implementing the prefix search method in cryptographically protected databases
Download
Download PDF