Amanote Research
Register
Sign In
Processing Encrypted Data
Computers and Security
- United Kingdom
doi 10.1016/0167-4048(88)90524-x
Full Text
Open PDF
Abstract
Available in
full text
Categories
Law
Computer Science
Date
February 1, 1988
Authors
Unknown
Publisher
Elsevier BV
Related search
Processing Analytical Queries Over Encrypted Data
Proceedings of the VLDB Endowment
Computer Science
Efficient Tree Search in Encrypted Data
Signal and Image Processing in the Encrypted Domain
ECTI Transactions on Computer and Information Technology
Electronic Engineering
Information Systems
Computer Networks
Communications
Management
Electrical
Private Searching on Encrypted Data in Cloud
International Journal of Computer Applications
Multiplexing Encrypted Data by Using Polarized Light
Optics Communications
Electronic Engineering
Electronic
Molecular Physics,
Theoretical Chemistry
Optical
Electrical
Atomic
Magnetic Materials
Optics
Physical
User Specific Semantic Search for Encrypted Data
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science
Multi-Keyword Similarity Search Over Encrypted Cloud Data
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Top-K Search Scheme on Encrypted Data in Cloud
International Journal of Advances in Applied Sciences
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
International Journal of Recent Trends in Engineering and Research