Return to Article Details Features of software implementing the prefix search method in cryptographically protected databases Download Download PDF