Login / Signup
Towards an efficient and secure computation over outsourced encrypted data using distributed hash table.
Raziqa Masood
Nitin Pandey
Q. P. Rana
Published in:
Int. J. Cloud Comput. (2022)
Keyphrases
</>
encrypted data
third party
sensitive data
encryption scheme
homomorphic encryption
sql queries
data sharing
service providers
data privacy
encryption algorithm
read write
distributed hash table
data storage
privacy preserving
data hiding
peer to peer
database systems
smart card
relational databases