Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New customer? Register
Subtotal: 0.00
Total Items In Cart:
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.