Font Size: a A A
Keyword [chosen keyword attack]
Result: 1 - 2 | Page: 1 of 1
1. Research On Several Issues Of Verifiable Search Over Encrypted Data Technique
2. Research On Searchable Encryption Key Technique In Cloud Environment
  <<First  <Prev  Next>  Last>>  Jump to