Return to Article Details
An Approach to Deal the Untrusted Malicious Parties in Anonymous Database Systems
Download
Download PDF