↓ Skip to main content

Secure IT Systems

Overview of attention for book
Attention for Chapter 6: Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
5 Mendeley