[1]
S. Mohammed and A. M. Rahma, “Index seek technique for Querying Encrypted Databases”, JQCM, vol. 11, no. 3, pp. Comp Page 59-68, Sep. 2019.