Browsing by Subject "string"
Now showing items 1-2 of 2
-
(2016-08-30)Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...
-
(Texas A&M University, 2006-10-30)A novel method to enhance oil production during cyclic steam injection has been developed. In the Top-Injection and Bottom-Production (TINBOP) method, the well contains two strings separated by two packers (a dual and a ...