Now showing items 1-1 of 1

    • Loyka, Kyle (2016-08-30)
      Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...