Login / Signup

An effective comparison protocol over encrypted data in cloud computing.

Leqi JiangYi CaoChengsheng YuanXingming SunXiaoli Zhu
Published in: J. Inf. Secur. Appl. (2019)
Keyphrases