Abstract
Using regular encryption schemes to protect the privacy of the outsourced data implies that the client should sacrifice functionality for security. Se......
小提示:本篇文献需要登录阅读全文,点击跳转登录