Login / Signup

Private Key based query on encrypted data.

Hammad AfzaliHamed NematiReza Azmi
Published in: ISC Int. J. Inf. Secur. (2012)
Keyphrases
  • private key
  • database
  • public key
  • encryption scheme
  • query processing
  • data sources
  • third party
  • access control
  • cost effective
  • ciphertext