Return to Article Details
Security Implications and Mitigation Strategies for One-To-Many Order Preserving Encryption in Cloud Data Search
Download
Download PDF