Return to Article Details
Data Protection based on Searchable Encryption and Anonymization Techniques
Download
Download PDF