Return to Article Details An Approach to Deal the Untrusted Malicious Parties in Anonymous Database Systems Download Download PDF