Return to Article Details Data Searches Techniques via Public Key Symmetric Encryption Download Download PDF