[1]
S. Dheyaa Mohammed and P. D. Abdul Monem S. Rahma, “Technique for querying over an encrypted database”, IJET, vol. 7, no. 4, pp. 6951–6955, Sep. 2018, doi: 10.14419/ijet.v7i4.29679.