作者: Johes Bater , Yongjoo Park , Xi He , Xiao Wang , Jennie Rogers
DOI:
关键词:
摘要: … and SAQE’s security primitives: secure computation, differential … databases prior to query processing by making query … in the query tree, we have our oblivious query plan. Figure 4 …