Return to Article Details Scattered Simulteneous and Autonomous Access to Encrypted Database Download Download PDF