Hiding Traversal of Tree Structured Data from Untrusted Data Stores

Publication Type:

Conference Paper

Source:

2nd International Workshop on Security in Information Systems-WOSIS04, Porto, Portugal (2004)
Share/Save