Skip to main content
. 2021 Sep 14;18(18):9668. doi: 10.3390/ijerph18189668

Figure 9.

Figure 9

Overview of searchable encryption.