Return to Article Details Technique for querying over an encrypted database Download Download PDF