Research Article

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

Figure 5

Deploying functional components to multiple servers.
153791.fig.005